
π―Skills43
Reviews code for adherence to industry-standard software engineering best practices, identifying potential improvements in design, performance, and maintainability.
Generates detailed SARIF reports for code vulnerabilities, mapping security issues across repositories with comprehensive analysis and tracking.
Detects and helps remediate weak randomness vulnerabilities in cryptographic implementations, highlighting potential entropy risks.
Rapidly maps and explores software project structures, dependencies, and architectural patterns across multiple programming languages and frameworks.
Generates comprehensive security documentation for codebases, identifying vulnerabilities, best practices, and compliance requirements across project files.
Identifies and flags insecure Cross-Origin Resource Sharing (CORS) configurations that expose web applications to potential cross-site scripting vulnerabilities
Detects and prevents mass assignment vulnerabilities by identifying unsafe parameter binding in web application models and frameworks.
Generates, validates, and manages cryptographic keys, encryption protocols, and secure communication workflows across different systems and platforms.
Detects and prevents cross-site scripting vulnerabilities by analyzing code patterns, input sanitization, and potential script injection risks.
Identifies and flags risky debug configurations that could expose sensitive system details in production environments.
Tracks and logs detailed entity state changes, interactions, and lifecycle events with configurable verbosity and structured output formats.
Detects and prevents phantom package dependencies in Python projects, reducing build errors and improving dependency management.
Detects and prevents session fixation vulnerabilities by identifying and mitigating potential authentication session hijacking risks in web applications.
Securely transmit data by selectively encrypting specific segments of a payload using configurable encryption protocols and key management.
Securely implement password authentication with salting, hashing, and validation for user login systems across different programming environments.
Detects and prevents directory traversal vulnerabilities by analyzing file path inputs and sanitizing potential malicious path manipulations.
Detects and prevents log injection vulnerabilities by sanitizing log inputs and implementing secure logging practices across applications
Implements secure, stateless authentication using opaque tokens with robust validation, token rotation, and revocation mechanisms for API and web service protection.
Identifies and flags insecure password hashing implementations that expose systems to credential compromise and brute-force attacks.
Identifies and recommends fixes for missing or misconfigured HTTP security headers that expose web applications to potential vulnerabilities.
Validates and sanitizes complex data structures, ensuring type safety, format compliance, and preventing injection vulnerabilities across different input sources.
Manages secure, granular user access permissions across application sessions using dynamic role-based authentication and fine-grained authorization rules.
Identifies and refactors code vulnerabilities where input validation is absent, preventing potential security risks and injection attacks.
Detects and prevents command injection vulnerabilities by analyzing input sanitization, escaping, and safe command execution patterns in code.
Detects and prevents LDAP injection vulnerabilities by analyzing input sanitization, authentication, and query construction patterns in code.
Detects and prevents insecure temporary file handling vulnerabilities in code, highlighting risky file creation patterns and suggesting secure alternatives.
Identifies and flags hardcoded credentials, API keys, and sensitive configuration values in source code to prevent security vulnerabilities.
Generates and validates message authentication codes (MACs) to ensure data integrity and authenticity in cryptographic communications
Implements robust authentication flows with secure token management, multi-factor validation, and best practices for preventing common security vulnerabilities
Identifies and flags security vulnerabilities where authentication mechanisms are improperly implemented or entirely absent in application endpoints.
Detects and flags insecure JSON Web Token (JWT) implementations, highlighting potential authentication vulnerabilities and misconfigurations.
Validates and manages user access permissions across systems, generating secure authentication tokens and enforcing role-based access controls
Generates, validates, and manages encryption keys and implements secure cryptographic protocols for data protection across various algorithms and use cases.
Detects and prevents SQL injection vulnerabilities by analyzing code patterns, input sanitization, and query parameterization techniques.
Identifies and prevents security vulnerabilities in file upload implementations by detecting unsafe handling of user-submitted files.
Identifies and refactors overly detailed error messages that obscure root causes, promoting clearer and more actionable debugging feedback
Identifies and flags weak cryptographic implementations, suggesting secure alternatives and highlighting potential vulnerabilities in encryption methods.
Filters and transforms Claude's text outputs by applying custom regex, length, format, and content rules for precise response control.
Detects and prevents XPath injection vulnerabilities by analyzing input sanitization and query construction in XML-based applications.
Provides secure encryption, decryption, key management, and cryptographic protocol implementation for protecting sensitive data across applications.
Identifies and refactors code lacking proper rate limiting, preventing potential API abuse, performance bottlenecks, and denial-of-service vulnerabilities.
Identifies and flags potential data leakage risks in code by detecting overly broad data exposures and recommending secure data access patterns.
Generates secure, cryptographically signed authentication tokens with robust validation mechanisms for distributed systems and microservices.