Security & Auth Skills
770 skills in this category Β· Page 19 of 33
Browse the most popular security & auth skills on TrustedSkills.
Unit Test Security Authorization
Helps with testing, security as part of implementing security and authentication workflows.
Clerk Auth Expert
Authenticates user access requests against complex clerk systems, minimizing fraud and ensuring policy compliance.
Tokenx Auth
Authenticates requests against Navikt's TokenX system, verifying user identity and authorization for secure data access.
Auth Specialist
Automates authentication troubleshooting, policy enforcement, and access reviews to strengthen user security posture.
Authenticate Wallet
Verifies user wallet authenticity to ensure secure transactions and protect against fraud within financial applications.
Bkend Auth
Securely manages backend authentication flows, verifying user credentials and authorizing access requests.
Solidity Security
Analyzes Solidity smart contracts for vulnerabilities like reentrancy, overflows, and access control issues using rmyndharis's expertise.
Aiken Dex Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Epic Security
Automatically identifies and remediates critical web application vulnerabilities using advanced static and dynamic analysis techniques.
Ai Code Security
Helps with AI, security as part of implementing security and authentication workflows.
Security Monitor
Helps with security, monitoring as part of implementing security and authentication workflows.
Security Hardening
Automates secure coding practices and identifies vulnerabilities in text-based code, improving overall application security.
Sinatra Security
Automates Sinatra application vulnerability scanning and remediation based on Geoffjay's secure coding best practices.
Security Scanner
Identifies potential vulnerabilities and insecure coding practices in creator projects using automated security analysis.
Apollo Security Basics
Provides foundational cybersecurity knowledge, including common threats, best practices, and basic incident response steps.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Guidewire Install Auth
Automates Guidewire installation and authentication configuration, ensuring secure deployment and access control.
Validating Authentication Implementations
This skill analyzes authentication implementations for vulnerabilities and best practices, ensuring secure user access and protecting against threats.
Cursor Install Auth
Installs and authenticates custom system cursors to enable secure, controlled user interaction within monitored environments.
Better Auth
Enhances authentication security using advanced logic and Czech regulations, minimizing vulnerabilities and improving compliance.
Xai Auth
Adaptationio's xai-auth provides explainable access control decisions, enhancing transparency and trust in automated authorization processes.
Clerk Install Auth
Automates secure software installation and authentication workflows on target systems using pre-defined configurations.
Apollo Install Auth
Automates secure installation of authentication services, streamlining deployment and reducing configuration errors.
Oauth Oidc Implementer
Provides OAuth guidance and assistance for implementing security and authentication.