Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Security
Security scanning, authentication, and vulnerability detection
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing...
Comprehensive security vulnerability scanner for Next.js and TypeScript/JavaScript projects. Detects OWASP Top 10...
Comprehensive security vulnerability scanner for Python projects including Flask, Django, and FastAPI applications....
JavaScript security best practices and vulnerability prevention.
Security best practices for secure coding, authentication, authorization, and data protection. Use when developing...
Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns,...
Generate realistic coach/player interview responses for wins, losses, controversies, injuries. Authentic coachspeak...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA,...
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development...
Security review and guidance for iOS, macOS, and watchOS apps. Covers secure storage, biometric authentication,...
Sets up secret-leak prevention guardrails with forbidden path checks, gitleaks config, CI secret scanning, and...
Runtime enforcement of file system boundaries and tool access restrictions. Blocks unauthorized operations and logs...
Expert in temporal event detection, spatio-temporal clustering (ST-DBSCAN), and photo context understanding. Use for...
Expert in residential hollow space detection, hidden room discovery, and safe room planning. Helps map house...
Security vulnerability scanner and OWASP compliance auditor for codebases. Dependency scanning (npm audit,...
Elite Application Security engineer specializing in secure SDLC, OWASP Top 10 2025, SAST/DAST/SCA integration,...
Expert DevSecOps engineer specializing in secure CI/CD pipelines, shift-left security, security automation, and...
Expert Harbor container registry administrator specializing in registry operations, vulnerability scanning with...
Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation