Create professional LinkedIn content and thought leadership posts that build authority
Security
Security scanning, authentication, and vulnerability detection
Implement security best practices across the application stack. Use when securing APIs, implementing authentication,...
Security vulnerability expert covering OWASP Top 10 and common security issues. Use when conducting security audits...
Language and naming conventions advisor for worldbuilding. Creates consistent naming systems, develops linguistic...
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets,...
Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS...
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing...
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.
Manage project dependencies across languages including npm install, package versioning, dependency conflicts,...
Create serverless functions on Azure with triggers, bindings, authentication, and monitoring. Use for event-driven...
Use when user needs WordPress development, theme or plugin creation, site optimization, security hardening,...
Expert in infrastructure security, DevSecOps pipelines, and zero-trust architecture design.
Expert in compliance frameworks (SOC2, ISO 27001), automated auditing, and risk management.
Expert in ethical hacking, vulnerability assessment, and offensive security testing (Web/Network/Cloud).
Use when user needs Active Directory security analysis, privileged group design review, authentication policy...
Audit websites for SEO, performance, security, technical, content, and 15 other issue cateories with 150+ rules...
Expense management and receipt scanning.
|
JavaScript security best practices and vulnerability prevention.