security-hardening
Application security covering input validation, auth, headers, secrets management, and dependency auditing
Content Preview
---
name: security-hardening
description: Application security covering input validation, auth, headers, secrets management, and dependency auditing
---
# Security Hardening
## Input Validation
Validate all input at the boundary. Never trust client-side validation alone.
```typescript
import { z } from 'zod';
const CreateUserSchema = z.object({
email: z.string().email().max(255),
name: z.string().min(1).max(100).regex(/^[a-zA-Z\s'-]+$/),
age: z.number().int().min(13).max(150),
});
fuHow to Use
Recommended: Install to project (local)
mkdir -p .claude/skills
curl -o .claude/skills/security-hardening.md \
https://raw.githubusercontent.com/rohitg00/awesome-claude-code-toolkit/main/skills/security-hardening/SKILL.mdSkill is scoped to this project only. Add .claude/skills/ to your .gitignoreif you don't want to commit it.
Alternative: Clone full repo
git clone https://github.com/rohitg00/awesome-claude-code-toolkitThen reference at skills/security-hardening/SKILL.md
Related Skills
security-hardening
Harden application security configuration
commandssecurityhardening
by qdhenry · claude-command-suite
security-scanning-security-hardening
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
securitysecurityscanninghardening
by sickn33 (Antigravity) · antigravity-awesome-skills
Scanning Container Security
This skill enables Claude to scan container images and running containers for vulnerabilities using tools like Trivy and Snyk. It identifies potential security risks in container environments. Use this skill when the user requests a security assessment of a container image, asks to identify vulnerab
skill-adapterscanning container security
by jeremylongshore · plugins-plus-skills
Scanning Database Security
This skill enables Claude to perform comprehensive database security scans using the database-security-scanner plugin. It is triggered when the user requests a security assessment of a database, including identifying vulnerabilities like weak passwords, SQL injection risks, and insecure configuratio
skill-adapterscanning database security
by jeremylongshore · plugins-plus-skills