Security & Auth Skills
770 skills in this category Β· Page 7 of 33
Browse the most popular security & auth skills on TrustedSkills.
Better Auth Core
Securely manages user authentication and authorization workflows, minimizing vulnerabilities and simplifying access control.
Security Bluebook Builder
Automatically generates comprehensive security bluebooks based on provided assets, policies, and threat models.
Security Engineer
Identifies and mitigates web application vulnerabilities using expert techniques inspired by 404kidwiz's security methodologies.
Security Scanning
Identifies vulnerabilities in code, configurations, and networks using automated scanning tools and reports potential risks.
Senior Security
Proactively identifies and mitigates advanced cyber threats using behavioral analysis and threat intelligence.
Ln 621 Security Auditor
Automates security audits, identifying vulnerabilities and misconfigurations across systems based on industry best practices.
Rbac Authorization Patterns
Automates secure role-based access control implementation using proven patterns, minimizing risk and ensuring compliance.
Clerk Authentication
Verifies user identity through existing clerk systems for secure data access and compliance, minimizing fraud risks.
Security
Identifies and remediates potential vulnerabilities in code and infrastructure using advanced static analysis and threat modeling.
Better Auth Protected Routes
Secure API routes with robust authentication and authorization checks, preventing unauthorized access.
Ad Security Reviewer
Analyzes ad creatives for policy violations, brand safety risks, and malicious content using advanced AI detection techniques.
Software Security
Identifies and mitigates software vulnerabilities using automated analysis and secure coding best practices.
Better Auth Best Practices
Helps with authentication, best practices as part of implementing security and authentication workflows.
Jwt Authentication
Provides JWT guidance and assistance for implementing security and authentication.
Better Auth Profile
Analyzes user authentication profiles to identify risky login patterns and potential compromise indicators.
Auth Setup
Helps with authentication, setup and configuration as part of implementing security and authentication workflows.
Auth Security Reviewer
Helps with authentication, security as part of implementing security and authentication workflows.
Pentest Commands
Executes common penetration testing commands (e.g., nmap, dirb) to quickly scan and assess system vulnerabilities for enhanced security analysis.
Oauth
Provides OAuth guidance and assistance for implementing security and authentication.
Better Auth Components
Helps with authentication, components as part of implementing security and authentication workflows.
Better Auth Setup
Helps with authentication, setup and configuration as part of implementing security and authentication workflows.
Security Threat Model
Helps with security, data modeling as part of implementing security and authentication workflows.
License Compliance Auditor
This tool automatically checks software installations against license agreements, ensuring regulatory adherence and preventing costly legal issues.
Accelint Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.