Back to tags
Tag

Agent Skills with tag: authorization

31 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

secure-code-guardian

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

authenticationauthorizationencryptionOWASP
Jeffallan
Jeffallan
245

auth-analyzer

Review and analyze authentication and authorization patterns for security vulnerabilities.

authenticationauthorizationsecurity-assessmentvulnerability-scanning
CuriousLearner
CuriousLearner
163

security

Security best practices for secure coding, authentication, authorization, and data protection. Use when developing features that handle sensitive data, user authentication, or require security review.

best-practicesauthenticationauthorizationsecure-coding
OpenHands
OpenHands
164

kirby-security-and-auth

Secure Kirby sites with access restriction, user roles, permissions, and protected downloads. Use when implementing login/role-based access, permissions, or file protection.

authenticationauthorizationaccess-controlpermissions
bnomei
bnomei
17

rails-security

Specialized skill for Rails security, authorization, and data protection. Use when implementing Pundit policies, Lockbox encryption, Blind Index searches, authentication, secure configuration, or fixing security vulnerabilities. Includes security best practices and common pitfall prevention.

ruby-on-railsauthenticationauthorizationweb-security
alec-c4
alec-c4
253

slb

Simultaneous Launch Button - Two-person rule for destructive commands in multi-agent workflows. Risk-tiered classification, command hash binding, 5 execution gates, client-side execution with environment inheritance. Go CLI.

gocommand-linemulti-agent-systemsauthorization
Dicklesworthstone
Dicklesworthstone
202

access-control-rbac

Implement Role-Based Access Control (RBAC), permissions management, and authorization policies. Use when building secure access control systems with fine-grained permissions.

role-based-access-controlaccess-controlauthorizationIAM
aj-geddes
aj-geddes
301

standard-security-auth

Security & Authentication Specialist - Expert in JWT, cookie-based auth, MFA, and generic security patterns

authenticationauthorizationJWTMFA
salavender
salavender
337

nuxt-better-auth

Use when implementing auth in Nuxt apps with @onmax/nuxt-better-auth - provides useUserSession composable, server auth helpers, route protection, and Better Auth plugins integration.

authenticationnuxtsession-persistenceauthorization
onmax
onmax
351

discover-security

Automatically discover security skills when working with authentication, authorization, input validation, security headers, vulnerability assessment, or secrets management. Activates for application security, OWASP, and security hardening tasks.

authenticationauthorizationvulnerability-assessmentsecrets-management
rand
rand
487

better-auth

|

authenticationauthorizationaccess-control
jezweb
jezweb
13119

clerk-auth

|

authenticationauthorizationsession-managementclerk
jezweb
jezweb
13119

cognito

AWS Cognito user authentication and authorization service. Use when setting up user pools, configuring identity pools, implementing OAuth flows, managing user attributes, or integrating with social identity providers.

AWSCognitoauthenticationauthorization
itsmostafa
itsmostafa
933415

Page 2 of 2 · 31 results