Apply Exa security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing Exa security configuration. Trigger with phrases like "exa security", "exa secrets", "secure exa", "exa API key security".
5.8
Rating
0
Installs
Security
Category
This skill provides solid, actionable security guidance for Exa API usage with clear code examples, environment variable management, secret rotation procedures, and audit logging patterns. The description adequately conveys when to use the skill. Structure is clean with logical sections and a helpful security checklist. However, novelty is limited—most content consists of standard security practices (environment variables, gitignore, least privilege, webhook signature verification) that a competent CLI agent could generate with appropriate prompting. The skill is well-executed but doesn't address complex or Exa-specific security challenges that would justify packaging as a reusable skill versus ad-hoc generation.
Loading SKILL.md…