| workflow:access-control-audit | Access Control Audit | workflows |
| workflow:ad-fraud-detection-setup | Ad Fraud Detection Setup | workflows |
| workflow:ai-safety-guardrail-maintenance | AI Safety Guardrail Maintenance | workflows |
| workflow:anti-cheat-system-audit | Anti-Cheat System Audit | workflows |
| workflow:artifact-signing-and-provenance | Artifact Signing and Provenance | workflows |
| workflow:bootloader-verification | Bootloader Verification | workflows |
| workflow:bug-bounty-triage | Bug Bounty Triage | workflows |
| workflow:container-image-hardening | Container Image Hardening | workflows |
| workflow:cryptographic-library-upgrade | Cryptographic Library Upgrade | workflows |
| workflow:csp-header-audit | CSP Header Audit | workflows |
| workflow:cve-response-coordination | CVE Response Coordination | workflows |
| workflow:fuzzing-campaign | Fuzzing Campaign | workflows |
| workflow:iac-security-scanning | IaC Security Scanning | workflows |
| workflow:ip-allowlist-management | IP Allowlist Management | workflows |
| workflow:key-ceremony | Key Ceremony | workflows |
| workflow:penetration-test-cycle | Penetration Test Cycle | workflows |
| workflow:phishing-simulation-exercise | Phishing Simulation Exercise | workflows |
| workflow:red-team-exercise | Red Team Exercise | workflows |
| workflow:secret-rotation | Secret Rotation | workflows |
| workflow:security-review | Security Review | workflows |
| workflow:smart-contract-audit | Smart Contract Audit | workflows |
| workflow:supply-chain-attack-simulation | Supply Chain Attack Simulation | workflows |
| workflow:vulnerability-management | Vulnerability Management | workflows |