Security & Auth Skills
770 skills in this category Β· Page 9 of 33
Browse the most popular security & auth skills on TrustedSkills.
Grove Auth Integration
Helps with authentication, integration as part of implementing security and authentication workflows.
Convex Auth
Convex-auth securely authenticates users against Convex data sources using AI-powered risk assessment and adaptive authorization.
Auth Security Expert
Helps with authentication, security as part of implementing security and authentication workflows.
Skills Security Check
Scans code, configurations, and dependencies for known vulnerabilities and insecure practices.
Workers Security
Proactively identifies and mitigates worker safety risks using real-time data analysis and predictive modeling.
Security Best Practices
Helps with security, best practices as part of implementing security and authentication workflows.
Spring Security
Automates Spring Security configuration, authentication, and authorization rules based on provided policies and data sources.
Prowler Compliance
Prowler Compliance automatically identifies misconfigurations in cloud environments, ensuring adherence to best practices and reducing security risks.
Prowler Compliance Review
Automates cloud configuration reviews against compliance standards, identifying deviations and remediation steps.
Better Auth Best Practices
Helps with authentication, best practices as part of implementing security and authentication workflows.
Api Security Hardening
Helps with API, security as part of implementing security and authentication workflows.
Create Auth Skill
Helps with creation, authentication as part of implementing security and authentication workflows.
Umbraco Auth Provider
Securely integrates Umbraco websites with external authentication providers via a streamlined AI-powered configuration process.
Security Architect
Designs secure cloud architectures and identifies vulnerabilities based on industry best practices and threat modeling.
Security Expert
Provides expert security guidance, risk assessments, and incident response strategies within personnel management workflows.
Security
Analyzes Singapore car accident trends to identify high-risk areas and inform proactive safety measures.
Authentication
Verifies user identities and access rights securely, ensuring only authorized individuals can utilize applications or data.
Web Security Testing
Helps with web development, security, testing as part of implementing security and authentication workflows.
Security Hardening
Automates server configuration changes to minimize vulnerabilities based on industry best practices and threat intelligence.
Backend Security Coder
Helps with backend development, security as part of implementing security and authentication workflows.
Defi Security
Analyzes DeFi smart contracts for vulnerabilities like reentrancy, overflows, and front-running risks with expert precision.
Claude Security Settings
Configure Claude's safety settings (e.g., refusal rates, content filters) to align with your organizationβs risk tolerance.
Tauri Security Rules
Enforces granular access control policies based on user roles and data sensitivity within Tauri applications.
Binance Auth
Securely authenticates with Binance API using provided credentials for data retrieval and trading operations.