Security & Auth Skills
770 skills in this category · Page 32 of 33
Browse the most popular security & auth skills on TrustedSkills.
Solidity Security
Identifies Solidity smart contract vulnerabilities like reentrancy and overflows, providing remediation suggestions.
Solidity Security
Identifies and remediates common Solidity vulnerabilities like reentrancy, overflow/underflow, and access control issues.
Security Catchall
Automatically identifies and flags unusual network activity, potential threats, and policy violations across all systems.
Authentication Flow
This Authentication Flow skill securely manages user login processes, verifying credentials and protecting your application from unauthorized access.
Mobile Security
Helps with mobile development, security as part of implementing security and authentication workflows.
Mobile Security Coder
Helps with mobile development, security as part of implementing security and authentication workflows.
Mobile Security Coder
Helps with mobile development, security as part of implementing security and authentication workflows.
Backend Security Coder
Helps with backend development, security as part of implementing security and authentication workflows.
Backend Security Coder
Helps with backend development, security as part of implementing security and authentication workflows.
Fullstack Security
Helps with full-stack development, security as part of implementing security and authentication workflows.
Security Auditor
Identifies potential security vulnerabilities and compliance gaps within organizations through automated data analysis and reporting.
Oauth Integrations
Provides OAuth guidance and assistance for implementing security and authentication.
Oauth Security Anti Pattern
Helps with OAuth, security as part of implementing security and authentication workflows.
Oauth
Provides OAuth guidance and assistance for implementing security and authentication.
Jwt Security
Helps with JWT, security as part of implementing security and authentication workflows.
Jwt
Provides JWT guidance and assistance for implementing security and authentication.
Firebase Auth
Helps with Firebase, authentication as part of implementing security and authentication workflows.
Understanding Tauri Ecosystem Security
Analyzes Tauri applications for vulnerabilities leveraging Beshkenadze's expertise in the ecosystem’s unique security landscape.
Understanding Tauri Lifecycle Security
Analyzes Tauri application lifecycle events and identifies potential security vulnerabilities based on Beshkenadze's research.
Auth Helper
Securely generates, stores, and retrieves authentication credentials, simplifying login processes and enhancing user security.
Api Security Best Practices
Helps with API, security, best practices as part of implementing security and authentication workflows.
Pentest Checklist
This Pentest Checklist generates a comprehensive security audit plan, streamlining penetration testing and ensuring thorough coverage.
Security Scanning Tools
Automates vulnerability scanning using a suite of tools to identify weaknesses in systems and applications.
Security Reviewer
Analyzes code and configurations for common vulnerabilities, suggesting remediation steps based on industry best practices.