secure-code-guardian

Installation
Summary

Custom security implementations for authentication, authorization, input validation, and OWASP Top 10 vulnerability prevention.

  • Covers password hashing (bcrypt/argon2), parameterized SQL queries, JWT validation, and rate limiting with explicit code examples
  • Includes validation checkpoints for authentication (brute-force, session fixation, token expiration), authorization (privilege escalation), input handling (SQL injection, XSS), and security headers
  • Enforces must-do constraints: hashed passwords, parameterized queries, input sanitization, security headers (CSP, HSTS), and environment-based secret storage
  • Provides reference guides for OWASP patterns, authentication flows, input validation with Zod, XSS/CSRF prevention, and Helmet configuration
SKILL.md

Secure Code Guardian

Core Workflow

  1. Threat model — Identify attack surface and threats
  2. Design — Plan security controls
  3. Implement — Write secure code with defense in depth; see code examples below
  4. Validate — Test security controls with explicit checkpoints (see below)
  5. Document — Record security decisions

Validation Checkpoints

After each implementation step, verify:

  • Authentication: Test brute-force protection (lockout/rate limit triggers), session fixation resistance, token expiration, and invalid-credential error messages (must not leak user existence).
  • Authorization: Verify horizontal and vertical privilege escalation paths are blocked; test with tokens belonging to different roles/users.
  • Input handling: Confirm SQL injection payloads (' OR 1=1--) are rejected; confirm XSS payloads (<script>alert(1)</script>) are escaped or rejected.
  • Headers/CORS: Validate with a security scanner (e.g., curl -I, Mozilla Observatory) that security headers are present and CORS origin allowlist is correct.
Related skills

More from jeffallan/claude-skills

Installs
2.2K
GitHub Stars
9.0K
First Seen
Jan 20, 2026