Security & Auth Skills
770 skills in this category Β· Page 23 of 33
Browse the most popular security & auth skills on TrustedSkills.
Vercel Enterprise Rbac
Automates Verceil Enterprise RBAC configuration and enforcement, streamlining access control management via secure AI automation.
Exa Install Auth
Automates secure software installation and authentication configuration across systems using pre-defined policies.
Customerio Install Auth
Securely installs and authenticates customer integrations, preventing unauthorized access and data breaches.
Better Auth
Automates secure authentication workflows, reducing errors and strengthening access controls based on fellipeutaka's best practices.
Clay Install Auth
Automates Clay installation, configuration, and authentication using secure scripts from jeremylongshore for enhanced security.
Fireflies Install Auth
Securely installs and configures firefly authentication plugins using pre-defined configurations from jeremylongshore.
Authentication Authorization Clerk
This skill securely verifies user identities and access rights, streamlining authentication & authorization processes for enhanced security.
Langchain Install Auth
Helps with LangChain, authentication as part of implementing security and authentication workflows.
Better Auth Ts
Automates secure authentication testing, identifying vulnerabilities like weak passwords and insecure protocols in web applications.
Auth Audit
Helps with authentication, auditing as part of implementing security and authentication workflows.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Solidity Security
Helps with scaffolding, security as part of implementing security and authentication workflows.
Supply Chain Security
Identifies vulnerabilities and risks across your supply chain, proactively mitigating disruptions and ensuring product integrity.
Security Scan
Identifies vulnerabilities and misconfigurations in code and infrastructure using automated security checks.
Security
Automatically identifies and remediates complex vulnerabilities across cloud environments using advanced threat intelligence.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Clay Security Basics
Provides foundational cybersecurity knowledge, including common threats, best practices, and basic mitigation techniques.
Privacy Data Security
Helps with data, security as part of implementing security and authentication workflows.
Security Testing Verification
Helps with security, testing as part of implementing security and authentication workflows.
Deepgram Security Basics
Assess website security posture using Deepgram's API to identify common vulnerabilities and basic configuration issues.
Exa Security Basics
Provides foundational cybersecurity knowledge, identifying common threats & vulnerabilities for basic risk mitigation.
Testing Security
Helps with testing, security as part of implementing security and authentication workflows.
Dependency Supply Chain Security
Identifies vulnerabilities and risks within software supply chains and dependencies to proactively enhance application security.
Security
Analyzes text for common web application vulnerabilities based on Daniel Miessler's comprehensive checklist.