api-security-best-practicesImplement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities
Install via ClawdBot CLI:
clawdbot install mupengi-bot/api-security-best-practicesGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://owasp.org/www-project-api-security/Audited Apr 16, 2026 · audit v1.0
Generated Mar 1, 2026
A financial technology company is building a new payment processing API that handles sensitive customer data and transactions. This skill helps implement JWT authentication, encrypt data in transit, and set rate limits to prevent fraud and DDoS attacks, ensuring compliance with regulations like PCI-DSS.
A healthcare provider is securing an API for a patient portal that accesses medical records and appointment scheduling. The skill guides input validation to prevent injection attacks, role-based authorization for doctors and patients, and secure error handling to avoid PHI leaks under HIPAA requirements.
An e-commerce business is developing APIs for third-party integrations with logistics and payment services. This skill assists in implementing OAuth 2.0 for secure authentication, throttling to manage high traffic during sales, and testing for vulnerabilities like SQL injection to protect customer data.
A smart home company is creating APIs to manage IoT devices such as sensors and cameras. The skill provides patterns for API key authentication, input sanitization to prevent command injection, and monitoring for suspicious activity to safeguard against unauthorized access and data breaches.
A government agency is building a public API for sharing open data with citizens and developers. This skill helps implement rate limiting to ensure fair usage, secure headers to prevent attacks like XSS, and penetration testing to meet security audit standards for public infrastructure.
A software-as-a-service company offers API security as part of its subscription-based platform. By integrating this skill, they can provide secure authentication and rate limiting features to clients, reducing development costs and attracting customers with robust security compliance.
A cybersecurity consulting firm uses this skill to conduct API security reviews and audits for clients. They offer tailored implementations for input validation and protection against OWASP Top 10 vulnerabilities, generating revenue through project-based contracts and ongoing support.
A company provides an API gateway solution that incorporates security features like throttling and JWT validation. Leveraging this skill, they enhance their product with best practices for data encryption and error handling, driving sales through enterprise licensing and usage-based pricing.
💬 Integration Tip
Start by implementing authentication and input validation in your API endpoints, then gradually add rate limiting and security testing to avoid overwhelming your development workflow.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.