Apply PostHog security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing PostHog security configuration. Trigger with phrases like "posthog security", "posthog secrets", "secure posthog", "posthog API key security".
6.4
Rating
0
Installs
Security
Category
Well-structured skill providing comprehensive PostHog security guidance with clear steps, code examples, and actionable checklists. The description accurately reflects capabilities, and the content delivers practical implementation patterns for API key management, least privilege access, and audit logging. Structure is clean with logical progression from basics to advanced patterns. However, novelty is limited—a CLI agent could reasonably gather similar security best practices from documentation, though this skill provides convenient consolidation and PostHog-specific patterns that save some tokens and research time.
Loading SKILL.md…