Back to tags
Tag

Agent Skills with tag: defense-in-depth

5 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthdata-validationmulti-layer-securityfault-tolerance
samjhecht
samjhecht
1

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthmulti-layer-validationinput-validationdata-integrity
NickCrew
NickCrew
52

security-architecture-overview

Understand the defense-in-depth security architecture of Secure Vibe Coding OS. Use this skill when you need to understand the overall security approach, the 5-layer security stack, OWASP scoring, or when to use other security skills. Triggers include "security architecture", "defense in depth", "security layers", "how does security work", "OWASP score", "security overview", "security principles".

security-architecturedefense-in-depthsecurity-layersOWASP
harperaa
harperaa
1

defense-implementation

Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security

defense-in-depthinput-validationoutput-encodingLLM-security
pluginagentmarketplace
pluginagentmarketplace
1

ccpm-debugging

Systematic debugging with defense-in-depth approach (symptoms → immediate cause → root cause → systemic issues → prevention). Auto-activates when user mentions "error", "failing", "broken", "debug", "bug", "issue" or when /ccpm:verify runs. Uses Observe → Hypothesize → Test → Confirm → Fix → Verify → Document workflow. Updates Linear with findings and automatically logs blockers that require external fixes. Traces root causes instead of patching symptoms. Integrates with ccpm-code-review to verify fixes pass all gates before marking complete. Suggests binary search for intermittent issues and five-whys analysis for complex problems.

debuggingtroubleshootingroot-cause-analysisdefense-in-depth
duongdev
duongdev
51