Back to tags
Tag

Agent Skills with tag: security

29 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

oauth

Implements OAuth 2.0/2.1 authorization flows in Fastify applications — configures authorization code with PKCE, client credentials, device flow, refresh token rotation, JWT validation, and token introspection/revocation endpoints. Use when setting up authentication, authorization, login flows, access tokens, API security, or securing Fastify routes with OAuth; also applies when troubleshooting token validation errors, mismatched redirect URIs, CSRF issues, scope problems, or RFC 6749/6750/7636/8252/8628 compliance questions.

oauthoauth2securityauthentication
mcollina
mcollina
1,663123

aws_architect

Expert AWS solution architecture for startups focusing on serverless, scalable, and cost-effective cloud infrastructure with modern DevOps practices and infrastructure-as-code

[automationawsawsarchitect
vuralserhat86
vuralserhat86
4212

deploy_cicd

CI/CD pipeline, GitHub Actions, automated deployment, release management, production shipping, and software delivery.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

deploy_monitoring

Health checks, metrics, alerting ve rollback stratejileri.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

docker_optimization

Docker image optimization patterns including multi-stage builds, layer caching, security hardening, and size reduction techniques. Use when building Docker images, optimizing container size, improving build performance, or implementing Docker security best practices. Reduces image sizes by 70-90% and build times by 50-80%.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

mcp_server_developer

Model Context Protocol (MCP) server implementation specialist for Claude Desktop integration. Handles TypeScript/Node.js server scaffolding, endpoint creation, telemetry setup, npx distribution, and comprehensive documentation. Follows MCP specification and best practices for production-grade server deployment.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

message_queues

Async communication patterns using message brokers and task queues. Use when building event-driven systems, background job processing, or service decoupling. Covers Kafka (event streaming), RabbitMQ (complex routing), NATS (cloud-native), Redis Streams, Celery (Python), BullMQ (TypeScript), Temporal (workflows), and event sourcing patterns.

[asyncautomationawsbash
vuralserhat86
vuralserhat86
4212

microservices_architect

Distributed systems architect specializing in microservices design patterns. Invoke for service boundaries, domain-driven design, saga patterns, event sourcing, service mesh, distributed tracing. Keywords: microservices, service mesh, distributed systems, Kubernetes, event-driven.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

microservices_patterns

Design microservices architectures with service boundaries, event-driven communication, and resilience patterns. Use when building distributed systems, decomposing monoliths, or implementing microservices.

[apigatewayautomationaws
vuralserhat86
vuralserhat86
4212

rust_development

Rust systems programming, memory safety, Axum/Tokio ve WebAssembly rehberi.

[automationawsbashscripting
vuralserhat86
vuralserhat86
4212

incident-response-plan

>

[incident-responsesecurityoperationsdevops
AfrexAI
AfrexAI
3,7881,049

soc2-evidence-collector

>

[soc2complianceauditsecurity
AfrexAI
AfrexAI
3,7881,049

vendor-risk-assessment

>

[vendor-risksecuritycomplianceprocurement
AfrexAI
AfrexAI
3,7881,049

moai-platform-auth

>

auth0clerkfirebaseauthentication
modu-ai
modu-ai
211

moai-tool-ast-grep

>

astrefactoringcode-searchlint
modu-ai
modu-ai
211

code-review

Review PRs, MRs, and Gerrit changes with focus on security, maintainability, and architectural fit. Leverages github, gitlab, or gerrit skills based on repository context. Use when asked to review my code, check this PR, review a pull request, look at a merge request, review a patchset, or provide code review feedback.

reviewsecuritymaintainabilitypr
odyssey4me
odyssey4me
21

code-review

Load PROACTIVELY when task involves reviewing code, auditing quality, or validating implementations. Use when user says \"review this code\", \"check this PR\", \"audit the codebase\", or \"score this implementation\". Covers the 10-dimension weighted scoring rubric (correctness, security, performance, architecture, testing, error handling, type safety, maintainability, accessibility, documentation), automated pattern detection for anti-patterns, and structured review output with actionable findings.

[reviewqualitysecurityperformance
mgd34msu
mgd34msu
61

review

Reviews code for quality, security, performance, and accessibility issues. Use when user mentions レビュー, review, コードレビュー, セキュリティ, パフォーマンス, 品質チェック, セルフレビュー, PR, diff, 変更確認. Do NOT load for: 実装作業, 新機能開発, バグ修正, セットアップ.

[reviewqualitysecurityperformance
aiskillstore
aiskillstore
23014

moai-platform-auth

>

auth0clerkfirebaseauthentication
modu-ai
modu-ai
873151

moai-tool-ast-grep

>

astrefactoringcode-searchlint
modu-ai
modu-ai
873151

vendor-risk-assessment

>

[vendor-risksecuritycomplianceprocurement
AfrexAI
AfrexAI
3,404970

soc2-evidence-collector

>

[soc2complianceauditsecurity
AfrexAI
AfrexAI
3,332953

vendor-risk-assessment

>

[vendor-risksecuritycomplianceprocurement
AfrexAI
AfrexAI
3,332953

authentication-setup

Design and implement authentication and authorization systems. Use when setting up user login, JWT tokens, OAuth, session management, or role-based access control. Handles password security, token management, SSO integration.

authenticationauthorizationsecurityJWT
autohandai
autohandai
0

code-review

Conduct thorough, constructive code reviews for quality and security. Use when reviewing pull requests, checking code quality, identifying bugs, or auditing security. Handles best practices, SOLID principles, security vulnerabilities, performance analysis, and testing coverage.

code-reviewcode-qualitysecuritybest-practices
autohandai
autohandai
0

security-best-practices

Implement security best practices for web applications and infrastructure. Use when securing APIs, preventing common vulnerabilities, or implementing security policies. Handles HTTPS, CORS, XSS, SQL Injection, CSRF, rate limiting, and OWASP Top 10.

securityHTTPSCORSXSS
autohandai
autohandai
0

agent-configuration

AI agent configuration policy and security guide. Project description file writing, Hooks/Skills/Plugins setup, security policy, team shared workflow definition.

agent-configurationsuperworkspwsecurity
autohandai
autohandai
0

deployment-checklist

Production deployment readiness checklist covering environment, security, monitoring, and operational concerns. Use before deploying to production or when setting up new environments.

deployment-readinessproduction-environmentsecuritymonitoring
MylesMCook
MylesMCook
0

Implementing Next.js with Supabase

Guides implementation of Next.js 15 App Router features with Supabase SSR. Helps choose between Server/Client Components, select correct Supabase client, and follow security patterns. Use when building pages, components, or API routes.

nextjssupabaseserver-side-renderingsecurity
lifegenieai
lifegenieai
0