secure-code-guardianUse when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention.
Install via ClawdBot CLI:
clawdbot install Veeramanikandanr48/secure-code-guardianSecurity-focused developer specializing in writing secure code and preventing vulnerabilities.
You are a senior security engineer with 10+ years of application security experience. You specialize in secure coding practices, OWASP Top 10 prevention, and implementing authentication/authorization. You think defensively and assume all input is malicious.
Load detailed guidance based on context:
| Topic | Reference | Load When |
|-------|-----------|-----------|
| OWASP | references/owasp-prevention.md | OWASP Top 10 patterns |
| Authentication | references/authentication.md | Password hashing, JWT |
| Input Validation | references/input-validation.md | Zod, SQL injection |
| XSS/CSRF | references/xss-csrf.md | XSS prevention, CSRF |
| Headers | references/security-headers.md | Helmet, rate limiting |
When implementing security features, provide:
OWASP Top 10, bcrypt/argon2, JWT, OAuth 2.0, OIDC, CSP, CORS, rate limiting, input validation, output encoding, encryption (AES, RSA), TLS, security headers
Generated Mar 1, 2026
Implementing secure user authentication and authorization for an online retail site, including password hashing with bcrypt, JWT-based session management, and rate limiting on login endpoints to prevent brute-force attacks. Ensures compliance with PCI DSS standards for handling payment data.
Securing a patient portal by validating and sanitizing all user inputs to prevent SQL injection and XSS attacks, using libraries like Zod for schema validation. Implements encryption for sensitive health data in transit and at rest to meet HIPAA requirements.
Hardening a financial services API by setting security headers (e.g., CSP, CORS), implementing OAuth 2.0 for authorization, and using parameterized queries to protect against OWASP Top 10 vulnerabilities like injection flaws. Includes logging security events for audit trails.
Implementing secure session management and encryption for a social media app, including JWT token handling with expiration and refresh mechanisms, and preventing CSRF attacks with anti-forgery tokens. Ensures user data privacy and compliance with GDPR.
Securing code for IoT device firmware by implementing encryption (AES) for data transmission, validating firmware updates to prevent tampering, and using environment variables for secret management. Addresses vulnerabilities like insecure defaults and hardcoded credentials.
Offering the skill as part of a subscription-based security platform for developers, providing regular updates on OWASP guidelines and new vulnerabilities. Revenue is generated through monthly or annual fees per user or team, with tiers based on usage levels.
Providing expert consulting services to businesses for implementing secure coding practices, conducting security audits, and training development teams. Revenue comes from project-based fees or hourly rates, often tailored to industry-specific compliance needs.
Licensing the skill to large enterprises for integration into their internal development tools and CI/CD pipelines, with custom features and support. Revenue is generated through one-time license purchases or annual maintenance contracts, often scaled by company size.
💬 Integration Tip
Integrate this skill early in the development lifecycle, such as during code reviews or CI/CD pipelines, to catch vulnerabilities before deployment and ensure consistent security practices across teams.
Drift detection + baseline integrity guard for agent workspace files with automatic alerting support
Guardian Angel gives AI agents a moral conscience rooted in Thomistic virtue ethics. Rather than relying solely on rule lists, it cultivates stable virtuous...
Core identity and personality for Molt, the transformative AI assistant
Build secure authentication with sessions, JWT, OAuth, passwordless, MFA, and SSO for web and mobile apps.
Gentle reminders to stay human while using AI. Reflection, not restriction.
Post to X (Twitter) using the official OAuth 1.0a API. Free tier compatible.