Back to tags
Tag

Agent Skills with tag: authentication

105 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

gh-address-comments

Help address review/issue comments on the open GitHub PR for the current branch using gh CLI; verify gh auth first and prompt the user to authenticate if not logged in.

github-clipull-requestscommand-lineauthentication
OutlineDriven
OutlineDriven
6

perplexity-research

Use when conducting web research with Perplexity API - covers authentication, search strategies, structured output generation, and integration patterns for Claude-interpretable results

perplexity-apiweb-searchauthenticationstructured-output
dbmcco
dbmcco
61

bitcoin-auth-diagnostics

Diagnose and troubleshoot bitcoin-auth token generation and verification issues. This skill should be used when users encounter authentication failures, signature verification errors, or integration problems with the bitcoin-auth library.

authenticationerror-handlingroot-cause-analysisbitcoin-auth
b-open-io
b-open-io
62

notebooklm

Use this skill to query your Google NotebookLM notebooks directly from Claude Code for source-grounded, citation-backed answers from Gemini. Browser automation, library management, persistent auth. Drastically reduced hallucinations through document-only responses.

browser-automationauthenticationretrieval-augmented-generationcitation-management
b-open-io
b-open-io
62

security-guardian

Expert en sécurité applicative pour détecter les vulnérabilités, auditer le code, et guider les bonnes pratiques de sécurité. OWASP Top 10, authentification, autorisation, cryptographie, gestion de secrets. Utiliser pour audits sécurité, reviews de code sensible, conception de features sécurisées, ou résolution de failles.

OWASPauthenticationauthorizationcryptography
Bikach
Bikach
10

api-developer

API 개발 전문가. REST API, FastAPI, Flask, 인증, 문서화.

fastapiflaskAPI-designauthentication
mdpman2
mdpman2
7

web-validation

Comprehensive web page validation with authentication, screenshot capture, mobile testing, and enhanced error detection

web-testingheadless-browserscreenshot-captureauthentication
bejranonda
bejranonda
1111

gh-address-comments

Help address review/issue comments on the open GitHub PR for the current branch using gh CLI; verify gh auth first and prompt the user to authenticate if not logged in.

pull-requestsgithub-cliauthenticationgit
bkircher
bkircher
91

surrealdb

Write production-ready SurrealDB queries and operations using SurrealQL. Use when users need to create schemas, write CRUD queries, model graph relationships, build authentication systems, optimize performance, or work with SurrealDB in any capacity.

crudauthenticationquery-optimizationschema-design
tyrchen
tyrchen
153

api-integration-builder

Generates production-ready API clients with TypeScript types, retry logic, rate limiting, authentication (OAuth, API keys), error handling, and mock responses. Use when user says "integrate API", "API client", "connect to service", or requests third-party service integration.

apitypescriptauthenticationrate-limiting
Toowiredd
Toowiredd
15

secure-code-guardian

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

authenticationauthorizationencryptionOWASP
Jeffallan
Jeffallan
245

django-expert

Use when building Django web applications or REST APIs with Django REST Framework. Invoke for Django models, ORM optimization, DRF serializers, viewsets, authentication with JWT. Keywords: Django, DRF, ORM, serializer, viewset, model.

pythondjangorest-apiorm
Jeffallan
Jeffallan
245

fastapi-expert

Use when building high-performance async Python APIs with FastAPI and Pydantic V2. Invoke for async SQLAlchemy, JWT authentication, WebSockets, OpenAPI documentation. Keywords: FastAPI, Pydantic, async, SQLAlchemy, JWT, OpenAPI.

fastapipythonasynchronous-programmingsqlalchemy
Jeffallan
Jeffallan
245

auth-analyzer

Review and analyze authentication and authorization patterns for security vulnerabilities.

authenticationauthorizationsecurity-assessmentvulnerability-scanning
CuriousLearner
CuriousLearner
163

ssh

Establish and manage SSH connections to remote machines, including key generation, configuration, and file transfers. Use when connecting to remote servers, executing remote commands, or transferring files via SCP.

sshterminalauthenticationnetwork-protocols
OpenHands
OpenHands
164

security

Security best practices for secure coding, authentication, authorization, and data protection. Use when developing features that handle sensitive data, user authentication, or require security review.

best-practicesauthenticationauthorizationsecure-coding
OpenHands
OpenHands
164

bitbucket

Interact with Bitbucket repositories and pull requests using the BITBUCKET_TOKEN environment variable. Use when working with code hosted on Bitbucket or managing Bitbucket resources via API.

bitbucketversion-controlpull-requestsAPI
OpenHands
OpenHands
164

kirby-security-and-auth

Secure Kirby sites with access restriction, user roles, permissions, and protected downloads. Use when implementing login/role-based access, permissions, or file protection.

authenticationauthorizationaccess-controlpermissions
bnomei
bnomei
17

Page 4 of 6 · 105 results