Security & Auth Skills
770 skills in this category Β· Page 24 of 33
Browse the most popular security & auth skills on TrustedSkills.
Auditing Wallet Security
Analyzes cryptocurrency wallet addresses for potential vulnerabilities and phishing risks using advanced threat intelligence.
Compliance Anthropic
Ensures AI outputs align with Anthropic's safety principles and legal requirements, minimizing risk and promoting responsible use.
Security Scanner
Identifies potential vulnerabilities in web applications and code using comprehensive static and dynamic analysis techniques.
Security Assessor
Identifies potential vulnerabilities in systems and code, providing prioritized remediation recommendations based on risk.
Checking Infrastructure Compliance
This skill verifies if your infrastructure meets defined security standards, proactively identifying and mitigating potential risks for enhanced protection.
Bknd Setup Auth
Helps with setup and configuration, authentication as part of implementing security and authentication workflows.
Railway Auth
Verifies railway signaling system access requests against predefined roles and policies, preventing unauthorized modifications.
Bknd Oauth Setup
Helps with OAuth, setup and configuration as part of implementing security and authentication workflows.
Sentry Install Auth
Automates secure deployment and authentication of sentry monitoring agents across diverse environments.
Bknd Public Vs Auth
Identifies if a backend resource requires public access or authentication based on configuration and code analysis.
Netease Auth
Authenticates users against NetEase's authentication servers using API credentials for secure access.
Auth Implementation Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Oauth2
Securely authenticates users and applications using OAuth 2.0, streamlining access to protected resources and enhancing application security.
Descope Auth
Securely manage user authentication and authorization flows within your application using Descope's flexible API.
Deepgram Install Auth
Automates Deepgram API key installation and authentication for secure audio transcription workflows.
Documenso Install Auth
Automates secure document installation & authentication workflows, minimizing risk and streamlining onboarding processes.
Ideogram Install Auth
Automates secure installation and authentication of ideograms using preconfigured profiles and credentials.
Better Auth
Automates secure authentication configuration and remediation across microservices to prevent common vulnerabilities.
Firecrawl Install Auth
Securely installs and configures FireCrawl agents on remote hosts using automated authentication methods.
Granola Install Auth
Automates secure Granola package installation and authentication using pre-defined credentials and policies.
Instantly Install Auth
Automatically configures authentication methods on new devices, streamlining onboarding and enhancing initial security posture.
Telnyx Numbers Compliance Javascript
Automates Telnyx number compliance checks in JavaScript to ensure regulatory adherence and prevent service disruptions.
Dependabot Security
Automatically identifies and remediates vulnerable dependencies in your project using Dependabot's security updates.
Pentest Engineer
This AI simulates a penetration tester, identifying vulnerabilities in systems and applications to bolster cybersecurity defenses proactively.