🔒Security
30,440
3,994

security-requirement-extraction

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

#threat-modeling#requirements#appsec#compliance#risk-management
Share
Quick Install
>_npx skills add wshobson/agents
Documentation
Loading documentation...
Repository
Repositorywshobson/agents
Stars30,440
Last UpdatedFeb 21, 2026
Related Skills
6,168
26

authentication-setup

Setup and manage authentication and authorization systems including JWT, OAuth, and role-based access control.

supercent-io
supercent-io/skills-template
6,013
23,974

azure-role-selector

Helps users select appropriate Azure roles based on required permissions with least privilege access.

github
github/awesome-copilot
5,028
26

security-best-practices

Implement security best practices for web apps and infrastructure, covering HTTPS, CORS, XSS, SQL injection, CSRF, rate limiting, and OWASP

supercent-io
supercent-io/skills-template
2,915
30,440

auth-implementation-patterns

Implement authentication and authorization patterns like JWT, OAuth2, session management, and RBAC for secure API access.

wshobson
wshobson/agents
2,614
30,440

solidity-security

Master Solidity smart contract security best practices for auditing, vulnerability prevention, and secure blockchain implementation.

wshobson
wshobson/agents