Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Security
Security scanning, authentication, and vulnerability detection
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Static Application Security Testing (SAST) for code vulnerability
Analyzes content for E-E-A-T signals and suggests improvements to
Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification...
Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or...
Skill for integrating Better Auth - the comprehensive TypeScript authentication framework.
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing...
Create serverless functions on Azure with triggers, bindings, authentication, and monitoring. Use for event-driven...
Manage project dependencies across languages including npm install, package versioning, dependency conflicts,...
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...
Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing...
Comprehensive security vulnerability scanner for Next.js and TypeScript/JavaScript projects. Detects OWASP Top 10...