Security Hardened
Comprehensive security practices: OWASP, API security, auth, dependencies, and secrets.
8 skills in this collectionOWASP Top 10 Prevention
Prevent the OWASP Top 10 web application vulnerabilities with concrete coding patterns.
Secure API Design
API security with authentication, authorization, rate limiting, and input validation.
Dependency Security & Supply Chain
Secure dependency management, vulnerability scanning, and supply chain attack prevention.
JWT Token Security Patterns
JWT security with signing algorithms, token lifecycle, refresh rotation, and common vulnerability prevention.
CORS Configuration & Security
Cross-Origin Resource Sharing configuration with secure defaults, preflight handling, and common pitfalls.
Authentication & Authorization Patterns
OAuth 2.0, JWT, session-based auth, RBAC, and secure authentication architecture.
Secrets Management
Secrets management with HashiCorp Vault, AWS SSM, environment variables, and rotation patterns.
Rate Limiting Implementation
Rate limiting patterns with sliding windows, token buckets, distributed limiting, and response handling.