Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation
Expert in ethical hacking, vulnerability assessment, and offensive security testing (Web/Network/Cloud).
Firebase Firestore NoSQL patterns, real-time sync ve security rules rehberi.
Generate and validate Kubernetes YAML manifests with best practices for Deployments, Services, ConfigMaps, and security policies.
Vue 3 and Nuxt 3 for JARVIS AI Assistant UI development with security-first patterns
Expert guidelines for Chrome extension development with Manifest V3, covering security, performance, and best practices
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and observability.
Review code for quality, security, and best practices. Use when analyzing code, suggesting improvements, or conducting code reviews.
Cross-platform desktop application framework combining Rust backend with web frontend, emphasizing security and performance
Assess and enhance software projects for enterprise-grade security, quality, and automation. Aligned with OpenSSF Scorecard, SLSA, and S2C2F.
Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration
Expert in RESTful API design, resource modeling, HTTP semantics, pagination, versioning, and secure API implementation
Analyze project dependencies for outdated packages, security vulnerabilities, and licensing issues. Use for dependency audits and maintenance.
Use when developing WordPress themes, plugins, customizing Gutenberg blocks, implementing WooCommerce features, or optimizing WordPress performance and security.
Use when developing WordPress themes, plugins, customizing Gutenberg blocks, implementing WooCommerce features, or optimizing WordPress performance and security.
Automatically discover cryptography skills when working with encryption, TLS, certificates, PKI, and security
Configure Cross-Origin Resource Sharing (CORS) and security headers. Use for APIs accessed from browsers on different domains.
OpenAPI Specification (OAS 3.x): document structure, paths, operations, schemas, parameters, security schemes, and validation.