Security & Auth Skills
770 skills in this category Β· Page 20 of 33
Browse the most popular security & auth skills on TrustedSkills.
Spring Boot Security Jwt
Helps with security, JWT as part of implementing security and authentication workflows.
Aiken Dex Security Audit Operator
Helps with security, auditing as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Vibe Security
Analyzes network traffic and user behavior to detect subtle anomalies indicative of insider threats or compromised accounts.
Security Checklist
Generates comprehensive security checklists tailored to specific systems and environments based on industry best practices.
Security Reviewer
Analyzes code and configurations for common vulnerabilities based on Alexander Danilenko's security expertise and best practices.
Security Check
Scans files and URLs for malware, phishing attempts, and vulnerabilities using iulspop's threat intelligence database.
Security Group Generator
Automatically creates AWS Security Groups based on provided resource types and port requirements, enhancing network security.
Performing Security Testing
Helps with security, testing as part of implementing security and authentication workflows.
Security Patterns
Helps with security, patterns as part of implementing security and authentication workflows.
Security And Hardening
Automates server hardening, vulnerability scanning, and configuration checks to improve system resilience.
Payment Security Clerk Billing Stripe
Helps with payments, security, Stripe as part of implementing security and authentication workflows.
Cursor Compliance Audit
Verifies application cursor usage to prevent data leaks and ensure database integrity through automated audit trails.
Checking Owasp Compliance
This skill analyzes code for OWASP Top 10 vulnerabilities, ensuring your application meets security standards and reducing risk.
Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.
Posthog Install Auth
Automates PostHog installation and authentication configuration to ensure secure data tracking and access control.
Groq Install Auth
Automates Groq environment setup, including secure authentication and credential management for enhanced access control.
Authentication
Verifies user identities securely, ensuring authorized access to applications and data for robust system protection.
Databricks Install Auth
Automates Databricks cluster installation and authentication setup using provided credentials for secure access.
Oauth Client Setup
Helps with OAuth, client-side, setup and configuration as part of implementing security and authentication workflows.
Authenticate Wallet
Verifies user wallet authenticity to ensure secure transactions and protect against fraud β a crucial security measure.
Juicebox Install Auth
Automates Juicebox installation and authentication, streamlining secure access to Apple's device data for research.
Configuring Better Auth
Automates secure authentication configuration, reducing vulnerabilities and simplifying management across systems.
Ce Auth
Securely authenticates commercial engine users and transactions via customizable rules and multi-factor authentication.