The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA,...
Security
Security scanning, authentication, and vulnerability detection
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Comprehensive security vulnerability scanner for Python projects including Flask, Django, and FastAPI applications....
Comprehensive security vulnerability scanner for Next.js and TypeScript/JavaScript projects. Detects OWASP Top 10...
Analyzes content for E-E-A-T signals and suggests improvements to
Static Application Security Testing (SAST) for code vulnerability
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Senior Security Engineer & Forensic Analyst. Expert in AI-driven vulnerability scanning, CTEM standards, and agentic...
DevSecOps skill for security automation, vulnerability management, secure CI/CD pipelines, container security,...
Generate realistic coach/player interview responses for wins, losses, controversies, injuries. Authentic coachspeak...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
Use when storing credentials in OCI Vault, troubleshooting secret retrieval failures, implementing secret rotation,...
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or...
Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.
Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification...
Expert guidance for Nchan, a scalable pub/sub server for Nginx. Use this skill when you need to configure Nchan...
Security hardening checklist and best practices for TYPO3 v13/v14 installations, covering configuration, file...
Postgres performance optimization and best practices from Supabase. Query performance, connection pooling, Row Level...
Assess and enhance software projects for enterprise-grade security, quality, and automation. Aligned with OpenSSF...