Security audit workflow - vulnerability scan → verification
Security
Security scanning, authentication, and vulnerability detection
Security-first PR review checklist for this repo. Use when reviewing diffs/PRs, especially changes involving auth,...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Static Application Security Testing (SAST) for code vulnerability
Analyzes content for E-E-A-T signals and suggests improvements to
Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification...
Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or...
Skill for integrating Better Auth - the comprehensive TypeScript authentication framework.
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing...
Automatically discover security skills when working with authentication, authorization, input validation, security...
Create serverless functions on Azure with triggers, bindings, authentication, and monitoring. Use for event-driven...
Manage project dependencies across languages including npm install, package versioning, dependency conflicts,...
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...
Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...