security▌
117 indexed skills · max 10 per page
security-documentation
aj-geddes/useful-ai-prompts · Documents
Create comprehensive security documentation including policies, guidelines, compliance requirements, and best practices for secure application development and operations.
wordpress-security-validation
bobmatnyc/claude-mpm-skills · Productivity
Version: 1.0.0 Target: WordPress 6.7+ | PHP 8.3+ Skill Level: Intermediate to Advanced
security-compliance-compliance-check
sickn33/antigravity-awesome-skills · Productivity
You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform comprehensive compliance audits and provide implementation guidance for achieving and maintaining compliance.
api-security-review
bobmatnyc/claude-mpm-skills · Backend
Comprehensive security checklist for API endpoint development. Ensures proper authentication, authorization, input validation, output safety, and security logging are implemented before deployment.
api-security-best-practices
sickn33/antigravity-awesome-skills · Backend
Comprehensive guide to securing APIs through authentication, authorization, input validation, rate limiting, and vulnerability protection. \n \n Covers five core security areas: JWT/OAuth authentication, role-based access control, input validation with parameterized queries, rate limiting with Redis, and DDoS protection via security headers \n Includes practical code examples for token generation, refresh flows, SQL injection prevention, XSS sanitization, and tiered rate limiting by user tier \n
security-review
affaan-m/everything-claude-code · Productivity
Comprehensive security checklist and patterns for authentication, input validation, secrets management, and sensitive operations. \n \n Covers 10 core security domains: secrets management, input validation, SQL injection prevention, authentication/authorization, XSS prevention, CSRF protection, rate limiting, sensitive data exposure, blockchain wallet verification, and dependency security \n Includes code examples for each vulnerability type with clear \"never do this\" and \"always do this\" pa
senior-security
alirezarezvani/claude-skills · Productivity
Security engineering tools for threat modeling, vulnerability analysis, secure architecture design, and penetration testing.