Quick security audit checklist covering authentication, function exposure, argument validation, row-level access...
Security
Security scanning, authentication, and vulnerability detection
Skill for integrating Better Auth - the comprehensive TypeScript authentication framework.
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
Implement security best practices across the application stack. Use when securing APIs, implementing authentication,...
Guide for implementing DefectDojo - an open-source DevSecOps, ASPM, and vulnerability management platform. Use when...
Manage authentication and user operations in Supabase. Use for sign up, sign in, sign out, password resets, and user...
Auditing for unsafe code and secrets.
Security scanner for Claude SKILL.md files. Detects vulnerabilities before they reach production.
Quick routine security checks for secrets, dependencies, container images, and common vulnerabilities. Run...
Use when user needs Active Directory security analysis, privileged group design review, authentication policy...
Expert in ethical hacking, vulnerability assessment, and offensive security testing (Web/Network/Cloud).
Expert in compliance frameworks (SOC2, ISO 27001), automated auditing, and risk management.
Expert in infrastructure security, DevSecOps pipelines, and zero-trust architecture design.
Use when user needs WordPress development, theme or plugin creation, site optimization, security hardening,...
Orchestrates comprehensive GitHub API access across all services. Intelligently routes API operations to specialized...
Security engineering that protects applications, data, and users from real-world threatsUse when "security,...
World-class application security - OWASP Top 10, secure coding patterns, and the battle scars from security...
Expert at securing web applications against OWASP Top 10 vulnerabilities. Covers authentication, authorization,...
One breach = game over. Threat modeling, OWASP Top 10, secure coding, security architecture, zero trust. The...
Use when implementing authentication. Use when storing passwords. Use when asked to store credentials insecurely.
Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS...
Security vulnerability expert covering OWASP Top 10 and common security issues. Use when conducting security audits...
Validate positioning, authority, and messaging strategy using Expert Secrets principles. Assess Attractive...
Security analysis, vulnerability assessment, and security code reviews