π¦ ClawHubclawhub
Security Auditor
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
v1.0.0by jgarrison929
View on ClawHub ββ οΈ BytesAgain does not review or verify third-party content. Proceed at your own risk.
π This skill is indexed from ClawHub and is available under its original license. BytesAgain is an independent directory β we do not host or own this content. All rights belong to the original author.
π Can't find the right skill?
Install our skill and let your agent search 43,000+ skills for you.