Back to tags
Tag

Agent Skills with tag: input-validation

17 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

nemo-guardrails

NVIDIA's runtime safety framework for LLM applications. Features jailbreak detection, input/output validation, fact-checking, hallucination detection, PII filtering, toxicity detection. Uses Colang 2.0 DSL for programmable rails. Production-ready, runs on T4 GPU.

runtime-safetyjailbreak-detectioninput-validationfact-checking
ovachiever
ovachiever
81

secure-coding-practices

Secure coding practices and defensive programming patterns for building security-first applications. Use when implementing authentication, handling user input, managing sensitive data, or conducting secure code reviews.

secure-codingdefensive-programmingauthenticationinput-validation
NickCrew
NickCrew
52

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthmulti-layer-validationinput-validationdata-integrity
NickCrew
NickCrew
52

input-validation-xss-prevention

Validate and sanitize user input to prevent XSS, injection attacks, and ensure data quality. Use this skill when you need to validate forms, sanitize user input, prevent cross-site scripting, use Zod schemas, or handle any user-generated content. Triggers include "input validation", "validate input", "XSS", "cross-site scripting", "sanitize", "Zod", "injection prevention", "validateRequest", "safeTextSchema", "user input security".

input-validationXSSsanitizationinjection-attacks
harperaa
harperaa
1

input-output-guardrails

Implementing safety filters, content moderation, and guardrails for AI system inputs and outputs

content-moderationsafety-checksinput-validationoutput-filtering
pluginagentmarketplace
pluginagentmarketplace
1

defense-implementation

Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security

defense-in-depthinput-validationoutput-encodingLLM-security
pluginagentmarketplace
pluginagentmarketplace
1

security-checklist

Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing application, or when users mention "security review," "ready to deploy," "going to production," or express concern about vulnerabilities. Covers authentication, input validation, secrets management, database security, and compliance basics.

security-assessmentpre-deploymentauthenticationinput-validation
jamditis
jamditis
1

api-hardening

API security hardening patterns. Use when implementing rate limiting, input validation, CORS configuration, API key management, request throttling, or protecting endpoints from abuse. Covers defense-in-depth strategies for REST APIs with practical implementations for Express, FastAPI, and serverless.

api-securityrate-limitinginput-validationcors
jamditis
jamditis
1

Security Engineer

Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vulnerabilities, or conducting security reviews. Covers OWASP Top 10, auth patterns, input validation, encryption, and security monitoring.

OWASPauthenticationinput-validationencryption
daffy0208
daffy0208
55

form-security

Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS prevention, and input sanitization. Use when implementing authentication forms, payment forms, or any form handling sensitive data.

csrfxssinput-validationform-handling
Bbeierle12
Bbeierle12
3

data-validation

Data validation patterns including schema validation, input sanitization, output encoding, and type coercion. Use when implementing form validation, API input validation, JSON Schema, Zod, Pydantic, sanitization, XSS prevention, or custom validators.

input-validationschema-validationjson-schemazod
cosmix
cosmix
3

security-checklist

Use this skill when implementing security measures or conducting security audits. Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Ensures applications are secure against common vulnerabilities.

owaspauthenticationinput-validationcompliance-audit
ArieGoldkin
ArieGoldkin
7

fastapi-code-review

Reviews FastAPI code for routing patterns, dependency injection, validation, and async handlers. Use when reviewing FastAPI apps, checking APIRouter setup, Depends() usage, or response models.

fastapidependency-injectionroutingasync-await
existential-birds
existential-birds
61

laravel-prompts

Laravel Prompts - Beautiful and user-friendly forms for command-line applications with browser-like features including placeholder text and validation

laravelphpcommand-linetui
rawveg
rawveg
112

secure-code-guardian

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

authenticationauthorizationencryptionOWASP
Jeffallan
Jeffallan
245

sql-injection-prevention

Prevent SQL injection attacks using prepared statements, parameterized queries, and input validation. Use when building database-driven applications securely.

sql-injectioninjection-attacksdatabase-securityinput-validation
aj-geddes
aj-geddes
301

api-security-hardening

Secure REST APIs with authentication, rate limiting, CORS, input validation, and security middleware. Use when building or hardening API endpoints against common attacks.

api-securityauthenticationrate-limitingcors
aj-geddes
aj-geddes
301
input-validation | Agent Skills