Productivity

security-best-practices

mindrally/skills · updated Apr 8, 2026

$npx skills add https://github.com/mindrally/skills --skill security-best-practices
summary

Apply these security principles when developing backend services, microservices, and any code handling sensitive data or external inputs.

skill.md

Security Best Practices

Apply these security principles when developing backend services, microservices, and any code handling sensitive data or external inputs.

Input Validation and Sanitization

  • Apply input validation and sanitization rigorously, especially on inputs from external sources
  • Validate all user inputs at the boundary of your application
  • Use allowlists over denylists when validating input
  • Sanitize data before storing or displaying to prevent injection attacks
  • Implement strict type checking and schema validation

Authentication and Authorization

  • Use secure defaults for JWT, cookies, and configuration settings
  • Implement proper token expiration and refresh mechanisms
  • Store secrets securely using environment variables or secret management services
  • Never hardcode credentials or API keys in source code
  • Use secure password hashing algorithms (bcrypt, Argon2)

Permission Boundaries

  • Isolate sensitive operations with clear permission boundaries
  • Apply the principle of least privilege throughout the system
  • Implement role-based access control (RBAC) where appropriate
  • Audit and log access to sensitive resources
  • Use separate service accounts for different components

Resilience and Protection

  • Implement retries, exponential backoff, and timeouts on all external calls
  • Deploy circuit breakers and rate limiting for service protection
  • Consider distributed rate-limiting to prevent abuse across services (e.g., using Redis)
  • Implement request throttling to prevent denial of service
  • Use connection pooling with appropriate limits

Secure Configuration

  • Use HTTPS/TLS for all network communications
  • Configure secure HTTP headers (HSTS, CSP, X-Frame-Options)
  • Disable verbose error messages in production
  • Keep dependencies updated and scan for vulnerabilities
  • Use secure defaults and fail securely

Error Handling

  • Implement comprehensive error handling throughout the application
  • Never expose stack traces or internal details to end users
  • Log security-relevant events with appropriate detail
  • Propagate context appropriately for debugging while maintaining security
  • Handle authentication and authorization failures gracefully

Secrets Management

  • Use environment variables or dedicated secrets managers
  • Rotate credentials and keys regularly
  • Implement proper key management practices
  • Avoid logging sensitive information
  • Use encryption at rest for sensitive data storage

SQL Injection Prevention

  • Use parameterized queries or prepared statements
  • Never concatenate user input into SQL queries
  • Use ORM features that automatically escape values
  • Validate and sanitize all database inputs
  • Limit database user permissions

Cross-Site Scripting (XSS) Prevention

  • Escape all output rendered in HTML
  • Use Content Security Policy headers
  • Sanitize user-generated content before display
  • Use framework-provided escaping functions
  • Avoid innerHTML and similar dangerous APIs

Cross-Site Request Forgery (CSRF) Prevention

  • Implement CSRF tokens for state-changing operations
  • Verify origin and referer headers
  • Use SameSite cookie attribute
  • Require re-authentication for sensitive actions
  • Implement proper session management

API Security

  • Implement API authentication (JWT, API keys, OAuth)
  • Use rate limiting to prevent abuse
  • Validate request content types
  • Implement request size limits
  • Log API access for auditing

Dependency Security

  • Regularly audit dependencies for vulnerabilities
  • Use lockfiles to ensure consistent versions
  • Remove unused dependencies
  • Monitor security advisories for your stack
  • Implement automated vulnerability scanning in CI/CD
general reviews

Ratings

4.556 reviews
  • Kofi Singh· Dec 28, 2024

    Useful defaults in security-best-practices — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.

  • Tariq Kim· Dec 28, 2024

    I recommend security-best-practices for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.

  • Xiao Rahman· Dec 24, 2024

    security-best-practices fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.

  • Tariq Huang· Dec 12, 2024

    Solid pick for teams standardizing on skills: security-best-practices is focused, and the summary matches what you get after install.

  • Naina Diallo· Dec 8, 2024

    Registry listing for security-best-practices matched our evaluation — installs cleanly and behaves as described in the markdown.

  • Jin Garcia· Dec 8, 2024

    security-best-practices fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.

  • Rahul Santra· Nov 27, 2024

    Useful defaults in security-best-practices — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.

  • Jin Thompson· Nov 19, 2024

    security-best-practices fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.

  • Naina Lopez· Nov 15, 2024

    I recommend security-best-practices for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.

  • Naina Thompson· Nov 3, 2024

    security-best-practices has been reliable in day-to-day use. Documentation quality is above average for community skills.

showing 1-10 of 56

1 / 6