Security & Auth Skills
770 skills in this category Β· Page 4 of 33
Browse the most popular security & auth skills on TrustedSkills.
Nextauth Authentication
Securely manages user sign-in and authorization for your applications using NextAuth, simplifying authentication workflows and boosting app security.
Backend Security Coder
Helps with backend development, security as part of implementing security and authentication workflows.
Jwt Security
Helps with JWT, security as part of implementing security and authentication workflows.
Security Testing
Helps with security, testing as part of implementing security and authentication workflows.
Better Auth
Automates complex authentication workflows, bypassing common hurdles and improving login success rates securely.
Security Scanning Security Hardening
Identifies vulnerabilities & automatically applies hardening configurations to improve system security posture.
Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Api Authentication
Provides API guidance and assistance for implementing security and authentication.
Oauth Implementation
Provides OAuth guidance and assistance for implementing security and authentication.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Frontend Security Coder
Helps with frontend development, security as part of implementing security and authentication workflows.
Security Scanning Tools
Identifies vulnerabilities in web applications and infrastructure using a suite of automated security scanning tools.
Security Audit Logging
Helps with security, auditing as part of implementing security and authentication workflows.
Pentest Checklist
This Pentest Checklist by davila7 generates a comprehensive security audit list to ensure thorough vulnerability assessments and improved system protection.
Pentest Commands
Executes common penetration testing commands (e.g., nmap, nikto) to quickly scan and assess system vulnerabilities for enhanced security analysis.
Smart Contract Security
Analyzes smart contracts for vulnerabilities like reentrancy and overflows, providing actionable remediation suggestions.
Security
Identifies and mitigates potential cybersecurity threats using advanced threat intelligence and automated vulnerability scanning.
Frontend Mobile Security Xss Scan
Helps with frontend development, mobile development, security as part of implementing security and authentication workflows.
Security
Identifies and mitigates potential vulnerabilities in code and systems using advanced static analysis and threat modeling techniques.
Security Headers Configuration
Automatically configure essential HTTP security headers to mitigate common web vulnerabilities.
Auth Implementation Patterns
Helps with authentication, patterns as part of implementing security and authentication workflows.
Clerk Auth
Authenticates user credentials against specified databases and APIs, enhancing access control and preventing unauthorized actions.
Accessibility Compliance Accessibility Audit
Identifies WCAG accessibility violations and potential security risks within web content and applications.
Security Review 2
Helps with security, code review as part of implementing security and authentication workflows.