npx claudepluginhub fujigo-software/f5-framework-claude --plugin f5-coreThis skill is limited to using the following tools:
Security knowledge essential for building secure applications,
api-security/api-keys.mdapi-security/cors.mdapi-security/input-validation.mdapi-security/rate-limiting.mdauthentication/jwt-tokens.mdauthentication/mfa.mdauthentication/oauth2-oidc.mdauthentication/passwordless.mdauthentication/session-management.mdauthorization/abac.mdauthorization/access-control.mdauthorization/permissions.mdauthorization/rbac.mdcompliance/gdpr.mdcompliance/pci-dss.mdcompliance/security-audit.mddata-protection/data-masking.mddata-protection/encryption.mddata-protection/hashing.mddata-protection/secrets-management.mdAuto-discovers security skills for authentication, authorization, input validation, security headers, vulnerability assessment, and secrets management in app security and OWASP tasks.
Guides secure coding practices and defensive patterns for authentication, user input handling, sensitive data management, cryptographic operations, and code reviews.
Provides OWASP Top 10 guidance and stack-agnostic principles for secure web apps. Use for code security reviews, auth/authorization implementation, secrets/API key handling, security headers, injection prevention (SQL/XSS/CSRF), and audits.
Share bugs, ideas, or general feedback.
Security knowledge essential for building secure applications, protecting user data, and preventing common vulnerabilities.
┌─────────────────────────────────────────────┐
│ Application Security │
│ ┌─────────────────────────────────────────┐│
│ │ Authentication & AuthZ ││
│ │ ┌───────────────────────────────────┐ ││
│ │ │ Input Validation │ ││
│ │ │ ┌─────────────────────────────┐ │ ││
│ │ │ │ Data Protection │ │ ││
│ │ │ └─────────────────────────────┘ │ ││
│ │ └───────────────────────────────────┘ ││
│ └─────────────────────────────────────────┘│
│ Infrastructure Security │
└─────────────────────────────────────────────┘
"Security is not a product, but a process." - Bruce Schneier
Always assume:
| Threat | Primary Defense | Secondary Defense |
|---|---|---|
| SQL Injection | Parameterized queries | Input validation |
| XSS | Output encoding | CSP headers |
| CSRF | CSRF tokens | SameSite cookies |
| Auth bypass | Strong authentication | Session management |
| Data breach | Encryption | Access control |