security
Use when: reviewing or fixing security vulnerabilities, preventing injection attacks, hardening authentication, validating inputs, protecting sensitive data, or performing zero-trust audits. Triggers on SQL, XSS, CSRF, auth, injection, Supabase, API keys, tokens, CORS, secrets.