🔒Security
25
52

security-auditor

Continuous security vulnerability scanning for OWASP Top 10, common vulnerabilities, and insecure patterns. Use when reviewing code, before deployments, or on file changes. Scans for SQL injection, XSS, secrets exposure, auth issues. Triggers on file changes, security mentions, deployment prep.

#vuln-scanning#audit#static-analysis#owasp#security-automation
Share
Quick Install
>_npx skills add ovachiever/droid-tings
Documentation
Loading documentation...
Repository
Repositoryovachiever/droid-tings
Stars25
Last UpdatedNov 25, 2025
Related Skills
6,168
26

authentication-setup

Setup and manage authentication and authorization systems including JWT, OAuth, and role-based access control.

supercent-io
supercent-io/skills-template
6,013
23,974

azure-role-selector

Helps users select appropriate Azure roles based on required permissions with least privilege access.

github
github/awesome-copilot
5,028
26

security-best-practices

Implement security best practices for web apps and infrastructure, covering HTTPS, CORS, XSS, SQL injection, CSRF, rate limiting, and OWASP

supercent-io
supercent-io/skills-template
3,994
30,440

security-requirement-extraction

Extract security requirements from threat models and business context for actionable security measures.

wshobson
wshobson/agents
2,915
30,440

auth-implementation-patterns

Implement authentication and authorization patterns like JWT, OAuth2, session management, and RBAC for secure API access.

wshobson
wshobson/agents