Skill

security

Application security best practices and patterns

From f5-core
Install
1
Run in your terminal
$
npx claudepluginhub fujigo-software/f5-framework-claude --plugin f5-core
Tool Access

This skill is limited to using the following tools:

ReadWriteGlobGrepBash
Supporting Assets
View in Repository
api-security/api-keys.md
api-security/cors.md
api-security/input-validation.md
api-security/rate-limiting.md
authentication/jwt-tokens.md
authentication/mfa.md
authentication/oauth2-oidc.md
authentication/passwordless.md
authentication/session-management.md
authorization/abac.md
authorization/access-control.md
authorization/permissions.md
authorization/rbac.md
compliance/gdpr.md
compliance/pci-dss.md
compliance/security-audit.md
data-protection/data-masking.md
data-protection/encryption.md
data-protection/hashing.md
data-protection/secrets-management.md
Skill Content

Security Skills

Overview

Security knowledge essential for building secure applications, protecting user data, and preventing common vulnerabilities.

Security Layers

┌─────────────────────────────────────────────┐
│              Application Security            │
│  ┌─────────────────────────────────────────┐│
│  │         Authentication & AuthZ          ││
│  │  ┌───────────────────────────────────┐  ││
│  │  │        Input Validation           │  ││
│  │  │  ┌─────────────────────────────┐  │  ││
│  │  │  │    Data Protection          │  │  ││
│  │  │  └─────────────────────────────┘  │  ││
│  │  └───────────────────────────────────┘  ││
│  └─────────────────────────────────────────┘│
│              Infrastructure Security         │
└─────────────────────────────────────────────┘

Categories

Authentication

  • JWT tokens and refresh strategies
  • OAuth 2.0 / OpenID Connect
  • Session management
  • Multi-factor authentication
  • Passwordless authentication

Authorization

  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)
  • Permission systems
  • Access control patterns

OWASP Top 10

  • Injection attacks
  • Broken authentication
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Security misconfiguration
  • Sensitive data exposure

API Security

  • Rate limiting
  • Input validation
  • API key management
  • CORS configuration

Data Protection

  • Encryption at rest/transit
  • Password hashing
  • Secrets management
  • Data masking/anonymization

Infrastructure

  • HTTPS/TLS configuration
  • Security headers
  • Container security
  • Network security

Compliance

  • GDPR requirements
  • PCI-DSS standards
  • Security auditing

Security Mindset

"Security is not a product, but a process." - Bruce Schneier

Always assume:

  • All input is malicious
  • External systems can be compromised
  • Attackers will find vulnerabilities
  • Defense in depth is essential

Quick Reference

ThreatPrimary DefenseSecondary Defense
SQL InjectionParameterized queriesInput validation
XSSOutput encodingCSP headers
CSRFCSRF tokensSameSite cookies
Auth bypassStrong authenticationSession management
Data breachEncryptionAccess control

Related Skills

Stats
Parent Repo Stars17
Parent Repo Forks7
Last CommitFeb 4, 2026