Security audit workflow - vulnerability scan → verification
Security
Security scanning, authentication, and vulnerability detection
Security-first PR review checklist for this repo. Use when reviewing diffs/PRs, especially changes involving auth,...
Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP,...
ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess...
WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Static Application Security Testing (SAST) for code vulnerability
Analyzes content for E-E-A-T signals and suggests improvements to
Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification...
Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or...
Skill for integrating Better Auth - the comprehensive TypeScript authentication framework.
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing...
Automatically discover security skills when working with authentication, authorization, input validation, security...
Create serverless functions on Azure with triggers, bindings, authentication, and monitoring. Use for event-driven...
Manage project dependencies across languages including npm install, package versioning, dependency conflicts,...
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...