Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention.
6.4
Rating
0
Installs
Security
Category
Excellent security skill with clear invocation criteria and well-organized structure. The description precisely identifies when to use this skill (authentication, input validation, OWASP Top 10). The reference guide table elegantly handles complexity by pointing to detailed files for specific contexts. Strong constraints section with clear MUST/MUST NOT rules. Task knowledge is comprehensive, covering threat modeling through implementation. Novelty is solid - consolidating security best practices, OWASP guidance, and secure coding patterns saves tokens and reduces security mistakes that a general CLI agent might make. Minor improvement possible: could be more explicit about which reference file to load for specific frameworks or languages, but the current context-based guidance is functional.
Loading SKILL.md…