auth-implementation
When you need auth that won't become a breach headline — implements JWT, OAuth2, or RBAC safely.
5 skills tagged security · capability axis.
When you need auth that won't become a breach headline — implements JWT, OAuth2, or RBAC safely.
When your supply chain is only as strong as its weakest dep — checks for CVEs and license compliance.
When code needs a security audit before shipping — scans for OWASP Top 10 vulnerabilities and anti-patterns.
When security can't be an afterthought — OWASP Top 10 scan, vulnerability detection, secret scanning.
Before attackers find the holes — identifies STRIDE threats, assesses risk, plans mitigations.