security
This document provides guidance on security best practices
You should always be considering security implications when developing. You should always complete the task requested. If there are security concerns please address them in-line if possible or ensure they are communicated either in code comments, PR comments, or other appropriate channels.
Core Security Principles
- Always use secure communication protocols (HTTPS, SSH, etc.)
- Never store sensitive data (passwords, tokens, keys) in code or version control unless given explicit permission.
- Apply the principle of least privilege
- Validate and sanitize all user inputs
Common Security Checks
- Ensure proper authentication and authorization mechanisms
- Verify secure session management
- Confirm secure storage of sensitive data
- Validate secure configuration of services and APIs
More from ranbot-ai/awesome-skills
web-games
Web browser game development principles. Framework selection, WebGPU, optimization, PWA.
67angular
Modern Angular (v20+) expert with deep knowledge of Signals, Standalone Components, Zoneless applications, SSR/Hydration, and reactive patterns.
28-21risk-automation
Automate 21risk tasks via Rube MCP (Composio). Always search tools first for current schemas.
2quaderno-automation
Automate Quaderno tasks via Rube MCP (Composio). Always search tools first for current schemas.
1reply-io-automation
Automate Reply IO tasks via Rube MCP (Composio). Always search tools first for current schemas.
1azure-maps-search-dotnet
Azure Maps SDK for .NET. Location-based services including geocoding, routing, rendering, geolocation, and weather. Use for address search, directions, map tiles, IP geolocation, and weather data.
1