Back to tags
Tag

Agent Skills with tag: authentication

105 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

Security Engineer

Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vulnerabilities, or conducting security reviews. Covers OWASP Top 10, auth patterns, input validation, encryption, and security monitoring.

OWASPauthenticationinput-validationencryption
daffy0208
daffy0208
55

Supabase Developer

Build full-stack applications with Supabase (PostgreSQL, Auth, Storage, Real-time, Edge Functions). Use when implementing authentication, database design with RLS, file storage, real-time features, or serverless functions.

supabasefull-stackauthenticationreal-time
daffy0208
daffy0208
55

API Designer

Design REST and GraphQL APIs. Use when creating backend APIs, defining API contracts, or integrating third-party services. Covers endpoint design, authentication, versioning, documentation, and best practices.

RESTGraphQLapi-designauthentication
daffy0208
daffy0208
55

browser-control

Full browser control for authenticated web interactions using Playwright scripts

playwrightbrowser-automationauthenticationautomated-testing
krishagel
krishagel
2

gcp-login

Authenticate to Google Cloud Platform using Application Default Credentials. Use when user selects GCP from cloud provider selection, or says "login to GCP", "gcloud auth", "authenticate to Google Cloud".

authenticationcredentials-managementGCPcli
brianclaridge
brianclaridge
21

aws-login

Authenticate to AWS using SSO. Use when user selects AWS from cloud provider selection, or says "login to AWS", "AWS SSO", "authenticate to AWS".

AWSauthenticationSSOIAM
brianclaridge
brianclaridge
21

connect-mcp-server

Guide for connecting MCP (Model Context Protocol) servers to Claude Code with HTTP, stdio, and SSE transports. Covers installation, configuration, authentication, environment variables, and security. Use when the user wants to connect MCP servers, add integrations, configure external services, or mentions MCP, servers, integrations, or external tools.

mcphttptool-integrationauthentication
ronnycoding
ronnycoding
6

kanidm-expert

Expert in Kanidm modern identity management system specializing in user/group management, OAuth2/OIDC, LDAP, RADIUS, SSH key management, WebAuthn, and MFA. Deep expertise in secure authentication flows, credential policies, access control, and platform integrations. Use when implementing identity management, SSO, authentication systems, or securing access to infrastructure.

authenticationIAMOAuthidentity-management
martinholovsky
martinholovsky
92

fastapi-expert

Expert FastAPI developer specializing in production-ready async REST APIs with Pydantic v2, SQLAlchemy 2.0, OAuth2/JWT authentication, and comprehensive security. Deep expertise in dependency injection, background tasks, async database operations, input validation, and OWASP security best practices. Use when building high-performance Python web APIs, implementing authentication systems, or securing API endpoints.

FastAPIasynchronous-programmingdependency-injectionauthentication
martinholovsky
martinholovsky
92

websocket

Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation

network-protocolsweb-securityauthenticationmessage-validation
martinholovsky
martinholovsky
92

security-patterns

Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure coding.

owaspweb-securityinjection-attacksauthentication
0xDarkMatter
0xDarkMatter
3

aws-sso-auth-guide

AWS SSO discovery, configuration, and terminal usage

authenticationAWSIAMterminal
Stakpak <team@stakpak.dev>
Stakpak <team@stakpak.dev>
3

api-endpoint

Create REST or GraphQL API endpoints with proper validation, error handling, authentication, and documentation. Use when building backend APIs or serverless functions.

RESTGraphQLauthenticationschema-validation
vapvarun
vapvarun
3

security

Web application security best practices including OWASP Top 10, authentication, authorization, input validation, cryptography, and secure coding patterns. Use when implementing security features, reviewing code for vulnerabilities, hardening applications, or fixing security issues.

web-application-securityOWASPauthenticationauthorization
vapvarun
vapvarun
3

webhooks

Webhook implementation and consumption patterns. Use when implementing webhook endpoints, sending webhooks, handling retries, or ensuring reliable delivery. Keywords: webhooks, callbacks, HMAC, signature verification, retry, exponential backoff, idempotency, event delivery, webhook security.

webhooksintegration-pointsretry-logicidempotency
cosmix
cosmix
3

cli

Use the pdsx CLI for ATProto record operations. Requires auth for writes, supports batch operations via stdin.

cliauthenticationpdsx-cliatproto
zzstoatzz
zzstoatzz
4

api-design-patterns

Language-agnostic API design patterns covering REST and GraphQL, including resource naming, HTTP methods, status codes, versioning, pagination, filtering, authentication, error handling, and schema design. Activate when working with APIs, REST endpoints, GraphQL schemas, API documentation, OpenAPI/Swagger, JWT, OAuth2, endpoint design, API versioning, rate limiting, or GraphQL resolvers.

api-designrestgraphqlapi-versioning
ilude
ilude
5

security-checklist

Use this skill when implementing security measures or conducting security audits. Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Ensures applications are secure against common vulnerabilities.

owaspauthenticationinput-validationcompliance-audit
ArieGoldkin
ArieGoldkin
7

Page 3 of 6 · 105 results