Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Security
Security scanning, authentication, and vulnerability detection
|
|
Continuous security vulnerability scanning for OWASP Top 10, common vulnerabilities, and insecure patterns. Use when...
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development...
Authentication testing skill for authorized penetration testing - automates signup, login, 2FA bypass, CAPTCHA...
Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive...
Audit websites for SEO, performance, security, technical, content, and 15 other issue cateories with 150+ rules...
Automated Dynamic Application Security Testing (DAST) using Playwright MCP for browser-based security scanning....
Software Composition Analysis skill for identifying vulnerable dependencies, license compliance, and supply chain...
Verify compliance with OWASP Top 10 2021 security standards. Use when
Auto-activates during requirements analysis to assess security risks
Scan codebase for security vulnerabilities including secrets, insecure
Check version compatibility, breaking changes, and security vulnerabilities
Guide for convex-helpers library patterns including Triggers, Row-Level Security (RLS), Relationship helpers, Custom...
Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building...
Security auditing for code vulnerabilities (OWASP Top 10, XSS, SQL injection) and dependency scanning (pnpm audit,...
Ultimate Bug Scanner - scan code for bugs across 7 languages (JS/TS, Python, Go, Rust, Java, C++, Ruby). Use before...
AccessorySetupKit for privacy-preserving discovery and setup of Bluetooth, Wi-Fi, or Wi-Fi Aware accessories. Use...
Create professional LinkedIn content and thought leadership posts that build authority
Scan code and infrastructure for security vulnerabilities and compliance issues
Create authoritative white papers that establish thought leadership and educate audiences
Comprehensive security audit for code changes. Use this skill when implementing authentication, authorization, user...
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and...