πŸ”’

Security & Auth Skills

770 skills in this category Β· Page 25 of 33

Browse the most popular security & auth skills on TrustedSkills.

Mobile Security Mobsf

by vchirrav

Helps with mobile development, security as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest8 installs

Gdpr Compliance

by bagelhole

Ensures your data handling aligns with GDPR regulations, minimizing legal risks and protecting user privacy – a crucial security asset.

🌐Community
Claude Code
vlatest8 installs

Pci Dss Compliance

by bagelhole

Ensures PCI DSS compliance by analyzing systems and processes, reducing risk and safeguarding sensitive cardholder data effectively.

🌐Community
Claude Code
vlatest8 installs

Fedramp Compliance

by bagelhole

This skill assesses your system against FedRAMP requirements for cloud security compliance, streamlining certification and reducing risk.

🌐Community
Claude Code
vlatest8 installs

Iso27001 Compliance

by bagelhole

This skill assesses your system against ISO 27001 requirements, ensuring security controls are in place and boosting your organization's compliance posture.

🌐Community
Claude Code
vlatest8 installs

Security Automation

by bagelhole

Helps with security, automation as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest8 installs

Hipaa Compliance

by bagelhole

Ensures your application adheres to HIPAA regulations, safeguarding sensitive patient data and mitigating legal risks for businesses.

🌐Community
Claude Code
vlatest8 installs

Soc2 Compliance

by bagelhole

This skill automates SOC 2 compliance checks, streamlining documentation and reducing audit risk for your business.

🌐Community
Claude Code
vlatest8 installs

Security Audit Example

by microck

Helps with security, auditing as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest8 installs

Security Audit

by factorial-io

Helps with security, auditing as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest8 installs

Security Check

by bjesuiter

Scans files and URLs for malware, vulnerabilities, and suspicious content using bjesuiter's advanced threat intelligence.

🌐Community
Claude Code
vlatest8 installs

Pentest Checklist

by jpropato

This Pentest Checklist by jpropato provides a structured guide for comprehensive security testing, ensuring thoroughness and reducing missed vulnerabilities.

🌐Community
Claude Code
vlatest8 installs

Clerk Auth

by omer-metin

Authenticates user access to sensitive documents and systems based on predefined rules and authorization protocols.

🌐Community
Claude Code
vlatest7 installs

Telnyx Oauth Java

by team-telnyx

Helps with OAuth, Java as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest7 installs

Openiddict Authorization

by thapaliyabikendra

This skill implements OpenID Connect (OIDC) authorization using OpenIDDict, streamlining secure user authentication and access control for applications.

🌐Community
Claude Code
vlatest7 installs

Oauth Oidc Implementer

by curiositech

Provides OAuth guidance and assistance for implementing security and authentication.

🌐Community
Claude Code
vlatest7 installs

Broken Authentication Testing

by jpropato

Automates testing for broken authentication vulnerabilities using jpropato's techniques to identify bypasses and weaknesses.

🌐Community
Claude Code
vlatest7 installs

Remix Api Key Auth

by farworld-labs

Helps with Remix, API, authentication as part of implementing security and authentication workflows.

🌐Community
Claude Code
vlatest7 installs

Modern Auth 2026

by curiositech

Analyzes modern authentication methods and predicts vulnerabilities in 2026 based on current trends.

🌐Community
Claude Code
vlatest7 installs

Auth Route Protection Checker

by hopeoverture

Verifies API endpoint access controls against defined policies, identifying potential authentication/authorization vulnerabilities.

🌐Community
Claude Code
vlatest7 installs

Authentication Patterns

by melodic-software

Analyzes software authentication sequences for subtle melodic patterns indicative of compromised credentials or malicious activity.

🌐Community
Claude Code
vlatest7 installs

Authorization Models

by melodic-software

Authorization Models define granular access rules based on attributes, enhancing security by dynamically controlling user permissions and reducing over-provisioning risks.

🌐Community
Claude Code
vlatest7 installs

Auth Analyzer

by curiouslearner

Analyzes authentication logs to detect suspicious activity, potential breaches, and policy violations.

🌐Community
Claude Code
vlatest7 installs

Terra Auth

by adaptationio

Terraform infrastructure access is securely managed and audited via automated policy enforcement with adaptationio's terra-auth.

🌐Community
Claude Code
vlatest7 installs