Security & Auth Skills
770 skills in this category Β· Page 22 of 33
Browse the most popular security & auth skills on TrustedSkills.
Gamma Install Auth
Securely installs and configures authentication agents using pre-approved methods and automated verification.
Oauth Callback Handler
Provides OAuth guidance and assistance for implementing security and authentication.
Twinmind Install Auth
Securely installs and authenticates Twinmind agents on remote systems using provided credentials and pre-configured settings.
Better Auth
Enhances authentication robustness against common attacks using advanced behavioral analysis and adaptive risk scoring.
Pentest Authentication Authorization Review
Analyzes authentication and authorization controls in systems to identify vulnerabilities and weaknesses for pentesting.
Coderabbit Install Auth
Securely installs and configures authentication libraries/tools using pre-defined scripts and best practices.
Evernote Install Auth
Securely installs and authenticates Evernote access via API, enabling automated data handling workflows.
Building Api Authentication
Helps with building, API as part of implementing security and authentication workflows.
Better Auth
Enhances authentication security by identifying and mitigating risky login attempts using advanced behavioral analysis.
Solidity Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Mobile Security
Helps with mobile development, security as part of implementing security and authentication workflows.
Generating Security Audit Reports
Helps with security, auditing as part of implementing security and authentication workflows.
Posthog Security Basics
Enforces PostHog security best practices like feature flag access controls and data masking to minimize risk.
Security Assessment
Identifies potential vulnerabilities and misconfigurations in systems and code, providing prioritized remediation recommendations.
Firecrawl Security Basics
Identifies common web vulnerabilities like SQL injection and XSS using basic automated checks.
Instantly Security Basics
Provides clear, concise explanations of essential cybersecurity concepts and best practices for immediate understanding.
Security Review 3
Helps with security, code review as part of implementing security and authentication workflows.
Security Integration Tests
Helps with security, integration as part of implementing security and authentication workflows.
Security
Analyzes text for sensitive data exposure, identifying PII, credentials, and vulnerabilities based on custom rulesets.
Finding Security Misconfigurations
Identifies common cloud and infrastructure misconfigurations based on industry best practices and JeremyLongshore's expertise.
Software Security
Identifies and remediates software vulnerabilities in code using automated analysis and secure coding best practices.
Enterprise Security
Identifies and mitigates enterprise security threats using real-time analysis of logs, vulnerabilities, and network activity.
Security Audit Owasp Top 10
Helps with security, auditing as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.