white-hat
White Hat
Build robust defensive security capabilities, implement security by design principles, and practice ethical hacking to proactively protect systems, data, and users while maintaining ethics and compliance.
When to use me
Use this skill when:
- Designing new systems with security requirements
- Implementing security controls and defensive measures
- Conducting authorized security testing and assessments
- Responding to security incidents with defensive tactics
- Building security awareness and training programs
- Implementing compliance and regulatory requirements
- Developing security architecture and design patterns
- Creating incident response plans and procedures
- Establishing security monitoring and detection capabilities
- Performing security code reviews and architectural analysis
What I do
More from wojons/skills
adversarial-thinking
Apply systematic adversarial thinking patterns including devil's advocate, assumption busting, red teaming, and white hat security approaches
45devils-advocate
Challenge ideas, assumptions, and decisions by playing devil's advocate to identify weaknesses and prevent groupthink
41redteam
Think and act like an attacker to identify security vulnerabilities, weaknesses, and penetration vectors through adversarial security testing
37code-migration
Guide framework and library migrations with incremental strategies, breaking change analysis, compatibility testing, and automated migration tools
35observability-logging
Use logs as part of comprehensive observability strategy including metrics, traces, alerts, and dashboards for system understanding and operational excellence
34gap-analysis
Identify discrepancies between documented requirements and actual implementation through systematic comparison and analysis
34