Security & Auth Skills
770 skills in this category Β· Page 12 of 33
Browse the most popular security & auth skills on TrustedSkills.
Security Ownership Map
Visually maps security ownership across your tech leads' club, identifying gaps and clarifying responsibilities for improved protection.
Arch Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Better Auth Best Practices
Helps with authentication, best practices as part of implementing security and authentication workflows.
Sip Authentication Security
Securely authenticates and validates SIP traffic using industry best practices, mitigating eavesdropping and unauthorized access.
Moai Platform Auth
Securely authenticates requests to the Moai platform using Modu AI's robust authorization protocols.
Medusa Security
Identifies and neutralizes network threats by mimicking deceptive server responses to lure and analyze attacker techniques.
V3 Security Overhaul
Helps with testing, security as part of implementing security and authentication workflows.
Information Security Manager Iso27001
Automates ISO 27001 compliance tasks, risk assessments, policy creation, and audit preparation for enhanced information security.
Compliance Policy Check
This tool swiftly verifies if your systems adhere to established compliance policies, minimizing risks and ensuring regulatory adherence.
Securing Authentication
Securing Authentication ensures users are properly identified and authorized, bolstering system security against unauthorized access.
Auth Expert
Analyzes authentication protocols, identifies vulnerabilities, and suggests secure implementation best practices.
Polar Better Auth
Securely authenticates users against Polar APIs using enhanced error handling and improved credential management.
Security
Identifies and mitigates potential security vulnerabilities in code and systems using advanced analysis techniques.
Senior Security
Identifies and remediates critical vulnerabilities across systems, proactively minimizing security risks and ensuring compliance.
Solana Security
Analyzes Solana transactions & smart contracts for vulnerabilities, exploits, and suspicious activity using tenequm's expertise.
Opencode Authentication
Verifies user identities by analyzing their codebase, providing a robust and unique authentication method for enhanced security.
Broken Authentication
Simulates failed login attempts to test authentication systemsβ resilience and identify vulnerabilities for improved security protocols.
Oauth Social Login
Provides OAuth guidance and assistance for implementing security and authentication.
Better Auth
Automates complex authentication workflows, reducing errors and improving security compliance across multiple systems.
Security Scanning
Identifies vulnerabilities and misconfigurations in cloud environments using automated scanning and prioritized remediation recommendations.
Security Patterns
Helps with security, patterns as part of implementing security and authentication workflows.
Understanding Tauri Ecosystem Security
Analyzes Tauri application architecture & dependencies to identify potential security vulnerabilities within the ecosystem.
Vibe Security
Analyzes communication patterns & sentiment to detect insider threats and subtle social engineering attempts.
Jwt Token Validator
Provides JWT guidance and assistance for implementing security and authentication.