Security & Auth Skills
770 skills in this category Β· Page 15 of 33
Browse the most popular security & auth skills on TrustedSkills.
Content Security Scan
Identifies potential vulnerabilities like malware, phishing links, and sensitive data exposure within uploaded content.
Security
Scans plugin agents for vulnerabilities, malware, and policy violations to ensure marketplace safety and user trust.
Api Security Testing
Helps with API, security, testing as part of implementing security and authentication workflows.
Aptx Api Plugin Auth
Helps with API, authentication as part of implementing security and authentication workflows.
Aptx Api Plugin Csrf
Provides API guidance and assistance for implementing security and authentication.
Github Auth
Helps with GitHub, authentication as part of implementing security and authentication workflows.
Auth Js
Securely generates and validates JWT authentication tokens using industry best practices and customizable configurations.
Auth Implementation Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Row Level Security
Enforces granular data access controls at the row level, preventing unauthorized viewing or modification of sensitive records.
Mobile App Security Testing
Helps with mobile development, security, testing as part of implementing security and authentication workflows.
Pentest Mobile App
Automates initial mobile app penetration testing, identifying common vulnerabilities like insecure data storage and weak authentication.
Security Auditor
Automates security audits, identifying vulnerabilities and compliance gaps based on rmynhdaris's defined standards and best practices.
Security Scanning Security Hardening
Automates comprehensive vulnerability scanning and system hardening based on rmynharis's best practices for enhanced security posture.
Security
Analyzes code and systems for vulnerabilities based on travisjneuman's expertise, providing actionable remediation advice.
Security Checklist
Automates security checklist completion, identifying vulnerabilities and ensuring compliance based on leavesfly's best practices.
Jazz Permissions Security
Automates granular access control based on jazz project roles, ensuring secure development workflows within Garden Co's environment.
Compliance Check
This tool automatically verifies if your code adheres to specified security policies and best practices, boosting development safety.
Authentication Patterns
Identifies common authentication vulnerabilities like weak passwords, MFA bypasses, and insecure session management in code.
Auth Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Lucia Auth
Lucia-Auth verifies user identities against multiple sources, enhancing access control and reducing unauthorized system entry.
Spring Security
Helps with AI, security as part of implementing security and authentication workflows.
Frontend Security Coder
Helps with frontend development, security as part of implementing security and authentication workflows.
Security Engineering
Designs, implements, and assesses secure systems & infrastructure to proactively mitigate vulnerabilities and threats.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.