Security analysis, vulnerability assessment, and security code reviews
Security
Security scanning, authentication, and vulnerability detection
Design Azure solutions across compute, storage, networking, and serverless with cost optimization, security...
Design GCP solutions across compute, storage, networking, and serverless with cost optimization, security hardening,...
Create optimized Dockerfiles with multi-stage builds, security hardening, and vulnerability scanning for minimal,...
Validate network security architecture with firewall rule analysis, segmentation verification, and defense-in-depth...
Validate software supply chain security with SBOM generation, dependency scanning, provenance verification, and SLSA...
Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing...
Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration
Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage
Guidelines for implementing OAuth 2.0 and OAuth 2.1 authentication flows with security best practices and PKCE
Security best practices for backend development, microservices, and secure coding patterns with emphasis on input...
Expert in Solidity smart contract development with security and gas optimization
Assess and enhance software projects for enterprise-grade security, quality, and automation. Aligned with OpenSSF...
Postgres performance optimization and best practices from Supabase. Query performance, connection pooling, Row Level...
Security hardening checklist and best practices for TYPO3 v13/v14 installations, covering configuration, file...
Senior Security Engineer & Forensic Analyst. Expert in AI-driven vulnerability scanning, CTEM standards, and agentic...
Claude Code skill for running structured security audits with actionable remediation plans
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
|
Expense management and receipt scanning.
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets,...
Python security best practices, OWASP, and vulnerability prevention
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA,...