tag

security

117 indexed skills · max 10 per page

skills (117)

security-documentation

aj-geddes/useful-ai-prompts · Documents

0

Create comprehensive security documentation including policies, guidelines, compliance requirements, and best practices for secure application development and operations.

wordpress-security-validation

bobmatnyc/claude-mpm-skills · Productivity

0

Version: 1.0.0 Target: WordPress 6.7+ | PHP 8.3+ Skill Level: Intermediate to Advanced

security-compliance-compliance-check

sickn33/antigravity-awesome-skills · Productivity

0

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform comprehensive compliance audits and provide implementation guidance for achieving and maintaining compliance.

api-security-review

bobmatnyc/claude-mpm-skills · Backend

0

Comprehensive security checklist for API endpoint development. Ensures proper authentication, authorization, input validation, output safety, and security logging are implemented before deployment.

api-security-best-practices

sickn33/antigravity-awesome-skills · Backend

0

Comprehensive guide to securing APIs through authentication, authorization, input validation, rate limiting, and vulnerability protection. \n \n Covers five core security areas: JWT/OAuth authentication, role-based access control, input validation with parameterized queries, rate limiting with Redis, and DDoS protection via security headers \n Includes practical code examples for token generation, refresh flows, SQL injection prevention, XSS sanitization, and tiered rate limiting by user tier \n

security-review

affaan-m/everything-claude-code · Productivity

0

Comprehensive security checklist and patterns for authentication, input validation, secrets management, and sensitive operations. \n \n Covers 10 core security domains: secrets management, input validation, SQL injection prevention, authentication/authorization, XSS prevention, CSRF protection, rate limiting, sensitive data exposure, blockchain wallet verification, and dependency security \n Includes code examples for each vulnerability type with clear \"never do this\" and \"always do this\" pa

senior-security

alirezarezvani/claude-skills · Productivity

0

Security engineering tools for threat modeling, vulnerability analysis, secure architecture design, and penetration testing.

prevpage 12 / 12next