Elite CI/CD pipeline engineer specializing in GitHub Actions, GitLab CI, Jenkins automation, secure deployment strategies, and supply chain security. Expert in building efficient, secure pipelines...
|
Expert guidance for implementing secure authentication systems including OAuth 2.0, SAML, OIDC, JWT, passwordless authentication, passkeys, and biometrics. Covers protocol selection, security best...
Scan code and infrastructure for security vulnerabilities and compliance issues
Integrate Stripe, PayPal, and payment processors. Handles checkout
Integrate Stripe, PayPal, and payment processors. Handles checkout
Integrate Stripe, PayPal, and payment processors. Handles checkout
Regular expression creation, testing, debugging and explanation guide.
Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.
Regular expression oluşturma, test etme, debug ve açıklama rehberi.
Review code for quality, security, and best practices. Use when analyzing code, suggesting improvements, or conducting code reviews.
Implement secure JWT (JSON Web Token) authentication in Node.js applications with access/refresh tokens and role-based access control
Review code for quality, security, and performance with comprehensive
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and least privilege validation.
Validate cryptographic implementations using NIST standards with TLS configuration, cipher suite analysis, and certificate lifecycle checks.
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Use when working with comprehensive review full review
Use when working with comprehensive review full review
Use when working with comprehensive review full review
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...