Security & Auth Skills
770 skills in this category Β· Page 17 of 33
Browse the most popular security & auth skills on TrustedSkills.
Security Patterns
Helps with security, patterns as part of implementing security and authentication workflows.
Security Automation
Helps with security, automation as part of implementing security and authentication workflows.
Security Compliance Compliance Check
Automates security compliance checks against rmynDharis standards, identifying gaps and suggesting remediation steps.
Security Scanning Security Dependencies
Identifies and flags vulnerable dependencies within projects, enhancing security posture through automated scanning by rmyndharis.
Aif Security Checklist
Generates tailored security checklists based on system details to proactively identify vulnerabilities and improve defenses.
Container Security
Identifies vulnerabilities and misconfigurations in container images and deployments to proactively harden your infrastructure.
Security Specialist
Analyzes network traffic and system logs to proactively identify and mitigate potential cybersecurity threats.
Review Security
Helps with code review, security as part of implementing security and authentication workflows.
Security
Identifies and flags potential security vulnerabilities in code, configurations, and network traffic based on established best practices.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Pentest Secrets Exposure
This skill identifies potential secret exposure risks during penetration tests by analyzing application logs and configurations for leaked credentials.
Soc2 Compliance Checker
This tool automatically checks documentation for SOC 2 compliance, streamlining audits and reducing risk exposure for your business.
Better Auth
Automates secure authentication workflows, reducing errors and improving compliance with binjuhor's robust security protocols.
Authentication Oauth
Provides OAuth guidance and assistance for implementing security and authentication.
Authenticate Openant
Authenticates users against OpenAnt systems, ensuring secure access and verifying identities for enhanced security protocols.
Authentication Flow Rules
Defines custom authentication steps within a flow, enhancing security by tailoring login processes to specific needs and contexts.
Authentication Flow
This Authentication Flow skill streamlines user login processes by managing credentials and verifying identities securely, boosting application protection.
Nuxt Better Auth
Helps with Nuxt, authentication as part of implementing security and authentication workflows.
Authorization Pundit
Authorization Pundit analyzes access control policies to identify potential vulnerabilities and ensure robust security implementations.
Fresh Auth
Automatically validates user credentials against fresh data sources to prevent account takeover and fraud.
Epic Auth
Securely authenticates users against Epic EHR systems using automated API calls and credential management.
Slack Auth Security
Helps with authentication, security as part of implementing security and authentication workflows.
Frontend Mobile Security Xss Scan
Helps with frontend development, mobile development, security as part of implementing security and authentication workflows.
Api Security
Helps with API, security as part of implementing security and authentication workflows.