auth-implementation
When you need auth that won't become a breach headline — implements JWT, OAuth2, or RBAC safely.
4 skills in this category.
When you need auth that won't become a breach headline — implements JWT, OAuth2, or RBAC safely.
When your supply chain is only as strong as its weakest dep — checks for CVEs and license compliance.
When code needs a security audit before shipping — scans for OWASP Top 10 vulnerabilities and anti-patterns.
Before attackers find the holes — identifies STRIDE threats, assesses risk, plans mitigations.