Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...
Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Rocky Linux 8/9 security hardening including CIS benchmarks with OpenSCAP, SSH hardening, fail2ban, auditd rules, PAM configuration with authselect, and system-wide crypto policies. Use when...
Master the AI tools that supercharge your sales process. From prospecting to closing, automate the grind and focus on building relationships that convert. Use when "sales automation, cold...
Master the AI tools that supercharge software development. From code completion to full application generation, write better code faster and automate the tedious parts. Use when "AI coding, code...
Performance optimization and continuous improvement for sobriety.tools recovery app. Use for load time optimization, offline capability, crisis detection, performance monitoring, automated issue...
Run a comprehensive security review on code
>
Use CloudBase Auth tool to configure and manage authentication providers for web applications - enable/disable login methods (SMS, Email, WeChat Open Platform, Google, Anonymous,...
Scan code and infrastructure for security vulnerabilities and compliance issues
Master smart contract security with auditing, vulnerability detection, and incident response
Guide for security-related Agent Skills including penetration testing, code auditing, threat hunting, and forensics skills.
Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
Use when user needs Active Directory security analysis, privileged group design review, authentication policy assessment, or delegation and attack surface evaluation across enterprise domains.
Use this skill when installing applications, packages, tools, or services on the system. Handles Python (uv), Node/JS/TS (bun), Docker containers, and GitHub-sourced installations with...
Expert in building developer tools, CLI utilities, IDE extensions, and optimizing local development environments.
Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage