security

Security is not optional - it's a fundamental requirement. This skill helps you build secure applications from the start, not bolt on security as an afterthought.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "security" with this command: npx skills add scientiacapital/skills/scientiacapital-skills-security

Security is not optional - it's a fundamental requirement. This skill helps you build secure applications from the start, not bolt on security as an afterthought.

<quick_start> Security essentials for any new project:

Secrets: Never commit to git, validate at startup

// .env (gitignored) + envSchema.parse(process.env)

Auth: Short-lived JWTs + httpOnly cookies

jwt.sign(payload, secret, { expiresIn: '15m' })

Input: Validate everything with schemas

const data = z.object({ email: z.string().email() }).parse(input)

SQL: Always use parameterized queries (ORMs handle this)

RLS: Enable on all Supabase tables with user-scoped policies </quick_start>

<success_criteria> Security implementation is successful when:

  • All secrets in environment variables, validated at startup

  • No secrets in version control (verified with gitleaks)

  • JWT tokens short-lived (≤15 min) with refresh token rotation

  • All user input validated with Zod or similar schema validation

  • RLS enabled on all database tables with appropriate policies

  • CSP headers configured (no unsafe-inline where possible)

  • Security checklist completed before deployment </success_criteria>

<security_mindset>

The Security Mindset

Core Principles

  • Defense in depth - Multiple layers of security, not one wall

  • Least privilege - Grant minimum access required

  • Never trust input - Validate everything from users and external systems

  • Fail secure - Errors should deny access, not grant it

  • Keep secrets secret - API keys never in code or logs

Security Questions to Ask

Before shipping any feature:

  • What data does this expose?

  • Who can access this endpoint/page?

  • What happens if the user sends malicious input?

  • Are secrets properly protected?

  • Is sensitive data logged? </security_mindset>

JWT vs Session

Aspect JWT Session

Storage Client (localStorage/cookie) Server (DB/Redis)

Scalability Stateless, easy to scale Requires shared session store

Revocation Hard (need blacklist) Easy (delete from store)

Size Larger (contains claims) Small (just session ID)

Best for APIs, microservices Traditional web apps

JWT Best Practices

// DO: Short-lived access tokens + refresh tokens const accessToken = jwt.sign( { userId: user.id, role: user.role }, process.env.JWT_SECRET, { expiresIn: '15m' } // Short-lived! );

const refreshToken = jwt.sign( { userId: user.id }, process.env.JWT_REFRESH_SECRET, { expiresIn: '7d' } );

// DON'T: Long-lived tokens with sensitive data // Bad example - never do this: // { expiresIn: '365d' } // Too long! // Including PII like SSN in token payload

Token Storage

Method XSS Safe CSRF Safe Recommendation

localStorage No Yes Avoid for auth

httpOnly cookie Yes No (needs CSRF token) Recommended

Memory (variable) Yes Yes Best for SPAs

Refresh Token Flow

┌─────────┐ ┌─────────┐ ┌─────────┐ │ Client │ │ Server │ │ DB │ └────┬────┘ └────┬────┘ └────┬────┘ │ │ │ │ Login (email, password) │ │ │─────────────────────────────>│ │ │ │ Verify credentials │ │ │─────────────────────────────>│ │ │<─────────────────────────────│ │ Access token (15m) │ │ │ Refresh token (7d) │ Store refresh token hash │ │<─────────────────────────────│─────────────────────────────>│ │ │ │ │ API call + access token │ │ │─────────────────────────────>│ │ │ Response │ │ │<─────────────────────────────│ │ │ │ │ │ [Access token expired] │ │ │ Refresh token │ │ │─────────────────────────────>│ Verify refresh token │ │ │─────────────────────────────>│ │ New access token │ │ │<─────────────────────────────│ │

Password Handling

import bcrypt from 'bcrypt';

// DO: Hash with sufficient rounds const SALT_ROUNDS = 12; // ~300ms on modern hardware const hash = await bcrypt.hash(password, SALT_ROUNDS);

// DO: Constant-time comparison const isValid = await bcrypt.compare(inputPassword, storedHash);

// DON'T: Use weak hashing algorithms like MD5 or SHA1 for passwords

Password Requirements

const passwordSchema = z.string() .min(8, 'Minimum 8 characters') .max(128, 'Maximum 128 characters') .regex(/[a-z]/, 'Must contain lowercase') .regex(/[A-Z]/, 'Must contain uppercase') .regex(/[0-9]/, 'Must contain number') .regex(/[^a-zA-Z0-9]/, 'Must contain special character');

// Check against common passwords (haveibeenpwned API) async function isPasswordPwned(password: string): Promise<boolean> { const sha1 = crypto.createHash('sha1').update(password).digest('hex').toUpperCase(); const prefix = sha1.slice(0, 5); const suffix = sha1.slice(5);

const response = await fetch(https://api.pwnedpasswords.com/range/${prefix}); const text = await response.text();

return text.includes(suffix); }

<secrets_management>

Secrets Management

Golden rule: Never commit secrets to version control. Use .env files (gitignored), validate all env vars at startup with Zod schemas, support rotation with multiple active secrets, and never log sensitive data.

See reference/secrets-management.md for gitignore patterns, env var templates, Zod validation, rotation patterns, and log masking. </secrets_management>

<input_validation>

Input Validation

Validate at System Boundaries

┌─────────────────────────────────────────────────────────┐ │ Your Application │ │ │ │ ┌──────────┐ VALIDATE ┌──────────────────┐ │ │ │ User │ ───────────────> │ Business Logic │ │ │ │ Input │ │ (trusted data) │ │ │ └──────────┘ └──────────────────┘ │ │ │ │ ┌──────────┐ VALIDATE ┌──────────────────┐ │ │ │ External │ ───────────────> │ Services │ │ │ │ API │ │ │ │ │ └──────────┘ └──────────────────┘ │ └─────────────────────────────────────────────────────────┘

Schema Validation (Zod)

import { z } from 'zod';

// Define schemas const createUserSchema = z.object({ email: z.string().email(), password: z.string().min(8).max(128), name: z.string().min(1).max(100), age: z.number().int().min(13).max(120).optional(), });

// Validate input export async function createUser(input: unknown) { const data = createUserSchema.parse(input); // Throws if invalid // data is now typed and validated return db.users.create(data); }

// API handler export async function POST(req: Request) { try { const body = await req.json(); const user = await createUser(body); return Response.json(user, { status: 201 }); } catch (error) { if (error instanceof z.ZodError) { return Response.json({ errors: error.errors }, { status: 400 }); } throw error; } }

Sanitization

import DOMPurify from 'dompurify'; import { JSDOM } from 'jsdom';

const window = new JSDOM('').window; const purify = DOMPurify(window);

// Sanitize HTML (for rich text fields) const cleanHtml = purify.sanitize(userInput, { ALLOWED_TAGS: ['b', 'i', 'em', 'strong', 'a', 'p'], ALLOWED_ATTR: ['href'] });

// For plain text - escape or strip HTML const plainText = purify.sanitize(userInput, { ALLOWED_TAGS: [] });

</input_validation>

<sql_injection>

SQL Injection Prevention

The Problem

Attackers can manipulate SQL queries through unsanitized input. Example attack payload: '; DROP TABLE users; --

The Solution: Parameterized Queries

// SAFE: Parameterized query (Prisma) const user = await prisma.user.findUnique({ where: { email: email } });

// SAFE: Parameterized query (raw SQL) const user = await db.query( 'SELECT * FROM users WHERE email = $1', [email] );

// SAFE: Supabase const { data } = await supabase .from('users') .select() .eq('email', email);

Supabase RLS (Row Level Security)

-- Enable RLS ALTER TABLE posts ENABLE ROW LEVEL SECURITY;

-- Users can only see their own posts CREATE POLICY "Users see own posts" ON posts FOR SELECT USING (auth.uid() = user_id);

-- Users can only create posts as themselves CREATE POLICY "Users create own posts" ON posts FOR INSERT WITH CHECK (auth.uid() = user_id);

-- Users can only update their own posts CREATE POLICY "Users update own posts" ON posts FOR UPDATE USING (auth.uid() = user_id);

-- Users can only delete their own posts CREATE POLICY "Users delete own posts" ON posts FOR DELETE USING (auth.uid() = user_id);

</sql_injection>

<xss_prevention>

XSS Prevention

The Problem

Attackers inject malicious scripts that execute in victim's browser, stealing cookies/data.

The Solution: Auto-escaping + CSP

// React auto-escapes by default - this is safe return <div>Welcome, {userName}</div>;

// AVOID rendering raw HTML from user input // If you absolutely must render user HTML, ALWAYS sanitize with DOMPurify first import DOMPurify from 'dompurify'; const sanitizedContent = DOMPurify.sanitize(userContent);

Content Security Policy

// next.config.js const securityHeaders = [ { key: 'Content-Security-Policy', value: [ "default-src 'self'", "script-src 'self'", // Avoid 'unsafe-inline' if possible "style-src 'self' 'unsafe-inline'", "img-src 'self' data: https:", "font-src 'self'", "connect-src 'self' https://api.supabase.co", ].join('; ') } ];

</xss_prevention>

<csrf_protection>

CSRF Protection

The Problem

Attackers trick authenticated users into submitting malicious requests to your site.

The Solution: CSRF Tokens + SameSite Cookies

// Server: Generate token import { randomBytes } from 'crypto';

function generateCsrfToken(): string { return randomBytes(32).toString('hex'); }

// Store in session session.csrfToken = generateCsrfToken();

// Client: Include in forms as hidden field // Server: Validate token matches session

// Modern approach: SameSite cookies (most effective) res.cookie('session', sessionId, { httpOnly: true, secure: true, sameSite: 'strict', // or 'lax' });

</csrf_protection>

Topic Reference File When to Load

Auth patterns reference/auth-patterns.md

JWT, OAuth, sessions

Secrets reference/secrets-management.md

API keys, env vars

Input validation reference/input-validation.md

Sanitization, schemas

Supabase RLS reference/rls-policies.md

Row level security

OWASP Top 10 reference/owasp-top-10.md

Vulnerability checklist

To load: Ask for the specific topic or check if context suggests it.

Before deploying:

Authentication

  • Passwords hashed with bcrypt (12+ rounds)

  • JWT tokens short-lived (15 min max)

  • Refresh tokens stored securely

  • Session cookies httpOnly + secure + sameSite

Secrets

  • No secrets in code or version control

  • Environment variables validated at startup

  • Secrets not logged

Input

  • All user input validated with schemas

  • SQL uses parameterized queries

  • HTML sanitized before rendering

  • File uploads validated (type, size, name)

Headers

  • HTTPS enforced

  • CSP header configured

  • CORS restricted to allowed origins

  • Security headers set (HSTS, X-Frame-Options)

Authorization

  • RLS enabled on all tables

  • API endpoints check permissions

  • Admin routes protected

  • Rate limiting on auth endpoints

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Skill Safe Install

L0 级技能安全安装流程。触发“安装技能/安全安装/审查权限”时,强制执行 Step0-5(查重→检索→审查→沙箱→正式安装→白名单)。

Registry SourceRecently Updated
3740Profile unavailable
Security

Skill Hunter

Find, evaluate, and install ClawHub skills. Semantic search across 10,000+ skills, security vetting before install, side-by-side comparison. The skill that m...

Registry SourceRecently Updated
5152Profile unavailable
Security

security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security

No summary provided by upstream source.

Repository SourceNeeds Review