Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration
Expert in RESTful API design, resource modeling, HTTP semantics, pagination, versioning, and secure API implementation
Analyze project dependencies for outdated packages, security vulnerabilities, and licensing issues. Use for dependency audits and maintenance.
Use when developing WordPress themes, plugins, customizing Gutenberg blocks, implementing WooCommerce features, or optimizing WordPress performance and security.
Use when developing WordPress themes, plugins, customizing Gutenberg blocks, implementing WooCommerce features, or optimizing WordPress performance and security.
Configure Cross-Origin Resource Sharing (CORS) and security headers. Use for APIs accessed from browsers on different domains.
OpenAPI Specification (OAS 3.x): document structure, paths, operations, schemas, parameters, security schemes, and validation.
Expert in Model Context Protocol server/client implementation, tool registration, transport layers, and secure MCP integrations
Create Reference Documents (REF) - supplementary documentation that doesn't participate in formal traceability chain
Design GCP solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Framework alignment.
Design Azure solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Framework alignment.
Guidelines for implementing OAuth 2.0 and OAuth 2.1 authentication flows with security best practices and PKCE
Validates OSCAL System Security Plan documents against schemas, profiles, and cross-reference requirements with tiered validation depth.
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and CISA ZTMM maturity assessment.
Expert in Tauri auto-update implementation with focus on signature verification, rollback mechanisms, staged rollouts, and secure update distribution
Java Spring Boot development guidelines with best practices for building robust, secure, and maintainable enterprise applications
WordPress and WooCommerce development guidelines with PHP best practices, security standards, and extensibility patterns
Node.js development principles and decision-making. Framework selection, async patterns, security, and architecture. Teaches thinking, not copying.
Node.js development principles and decision-making. Framework selection, async patterns, security, and architecture. Teaches thinking, not copying.
Node.js development principles and decision-making. Framework selection, async patterns, security, and architecture. Teaches thinking, not copying.