Comprehensive security audit for code changes. Use this skill when implementing authentication, authorization, user...
Security
Security scanning, authentication, and vulnerability detection
NextDNS API integration best practices for authentication, profile management, analytics, logs, and real-time...
Translates boring corporate speak into authentic 17th-century pirate lingo.
Expert in Solidity smart contract development with security and gas optimization
Security best practices for backend development, microservices, and secure coding patterns with emphasis on input...
Guidelines for implementing OAuth 2.0 and OAuth 2.1 authentication flows with security best practices and PKCE
Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage
Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration
Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation
Expert Harbor container registry administrator specializing in registry operations, vulnerability scanning with...
Expert DevSecOps engineer specializing in secure CI/CD pipelines, shift-left security, security automation, and...
Elite Application Security engineer specializing in secure SDLC, OWASP Top 10 2025, SAST/DAST/SCA integration,...
Orchestrates comprehensive GitHub API access across all services. Intelligently routes API operations to specialized...
Guide for implementing DefectDojo - an open-source DevSecOps, ASPM, and vulnerability management platform. Use when...
Ultimate Bug Scanner - scan code for bugs across 7 languages (JS/TS, Python, Go, Rust, Java, C++, Ruby). Use before...
Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing...
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing...
Guide for convex-helpers library patterns including Triggers, Row-Level Security (RLS), Relationship helpers, Custom...
Security vulnerability scanner and OWASP compliance auditor for codebases. Dependency scanning (npm audit,...
Expert in residential hollow space detection, hidden room discovery, and safe room planning. Helps map house...
Expert in temporal event detection, spatio-temporal clustering (ST-DBSCAN), and photo context understanding. Use for...
Runtime enforcement of file system boundaries and tool access restrictions. Blocks unauthorized operations and logs...
Create authoritative white papers that establish thought leadership and educate audiences
Scan code and infrastructure for security vulnerabilities and compliance issues