Security & Auth Skills
770 skills in this category Β· Page 2 of 33
Browse the most popular security & auth skills on TrustedSkills.
Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.
Authentication Setup
Automates secure user authentication setup across platforms, streamlining onboarding and enhancing system security.
Security Requirement Extraction
Extracts key security requirements from documents like policies, contracts, and regulations for automated compliance checks.
Accessibility Compliance
Ensures digital content meets accessibility standards (WCAG) for inclusivity and legal compliance, minimizing risk & broadening user reach.
Auth Implementation Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Solidity Security
Identifies common Solidity vulnerabilities like reentrancy, overflows, and front running in smart contracts.
Ai Tool Compliance
Ensures Supercent AI tools adhere to specified data privacy regulations and internal compliance policies.
Pci Compliance
This skill assesses systems for PCI DSS compliance, safeguarding sensitive cardholder data and minimizing potential breaches β crucial for businesses handling payments.
Api Security Best Practices
Helps with API, security, best practices as part of implementing security and authentication workflows.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Convex Security Check
Analyzes code and infrastructure configurations for convexity vulnerabilities to proactively prevent financial exploits.
Convex Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Security Reviewer
Identifies potential vulnerabilities in code, configurations, and infrastructure based on industry best practices and common attack vectors.
Nuxt Better Auth
Helps with Nuxt, authentication as part of implementing security and authentication workflows.
Spec To Code Compliance
This skill automatically checks your software specifications against secure coding standards, ensuring compliance and reducing vulnerabilities.
Security Scan
Identifies vulnerabilities in code, configurations, and networks using automated scanning tools and reports findings.
Senior Security
Davila7's senior-security analyzes complex threat landscapes, recommends robust defenses, and mitigates advanced cyber risks.
Better Auth
Automates secure password generation, storage, and rotation to significantly reduce authentication vulnerabilities.
Auth Wechat Miniprogram
Authenticates users via Tencent CloudBase's WeChat Mini Program authorization flow for secure access control.
Owasp Security
Identifies OWASP Top 10 vulnerabilities in code and suggests remediation strategies based on best practices.
Firebase Auth
Helps with Firebase, authentication as part of implementing security and authentication workflows.
Oauth Integrations
Provides OAuth guidance and assistance for implementing security and authentication.
Clerk Auth
Automates verification of clerk authorization records against external databases to detect fraud and policy violations.