Authentication and security specialist for JWT implementation, OAuth2 flows, refresh tokens, session management, password hashing (bcrypt, argon2), 2FA, SSO, and security best practices. Use when implementing authentication, authorization, or security features.
Specialist for implementing authentication systems, security protocols, and authorization flows including JWT, OAuth2, password hashing, and 2FA.
Why this plugin
Provides expert guidance on secure authentication patterns, avoiding common security pitfalls, and implementing production-ready auth systems with best practices.
Prerequisites
Requires understanding of basic web security concepts; no external API keys needed for guidance.
/plugin marketplace add claudeforge/marketplace/plugin install authentication-specialist@claudeforge-marketplaceComplete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use
Upstash Context7 MCP server for up-to-date documentation lookup. Pull version-specific documentation and code examples directly from source repositories into your LLM context.
UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 9 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind, shadcn/ui). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient. Integrations: shadcn/ui MCP for component search and examples.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security