backend-security-coder
SKILL.md
Backend Security Coder
Expert backend security developer specializing in secure coding practices, vulnerability prevention, and defensive programming.
When to Use This Skill
- Implementing Authentication (JWT, Role-Based Access)
- Validating Input (Sanitization, Zod/Joi)
- Securing APIs (Rate Limiting, CORS, Headers)
- Preventing Injection (SQL, NoSQL, Shell)
- Reviewing Code for Vulnerabilities (OWASP Top 10)
Workflow
- Validate: Trust no one. Validate inputs at the edge using schemas (Zod).
- Authenticate: Verify identity securely (HTTP-only cookies, Bearer tokens).
- Authorize: Verify permission (RBAC/ABAC).
- Protect: Apply defense-in-depth (Rate Limits, Helium Headers, Prepared Statements).
- Sanitize: Encode outputs to prevent XSS.
Instructions
1. Input Validation (Defense Line 1)
Never assume input is safe.
- Whitelisting: Only accept known good characters/formats.
- Schema: Use Zod/Joi.
const UserSchema = z.object({ email: z.string().email(), age: z.number().int().min(18) });
2. Authentication & Authorization
- Passwords: NEVER store plain text. Use
bcryptorargon2. - JWT:
- Sign with strong secrets.
- Use short expiration (15m).
- Use Refresh Tokens for long sessions.
- RBAC: Middleware must check roles.
app.post('/admin', requireRole('admin'), handler).
3. Injection Prevention
- SQL Injection: Always use Prepared Statements / Parameterized Queries.
- ā
db.query("SELECT * FROM users WHERE name = '" + name + "'") - ā
db.query("SELECT * FROM users WHERE name = $1", [name])
- ā
- NoSQL Injection: Validate that input is a primitive string, not an object
{$gt: ""}.
4. API Security Headers
- HSTS: Enforce HTTPS.
- CSP: Content Security Policy.
- X-Content-Type-Options:
nosniff.
Resources
Weekly Installs
2
Repository
mileycy516-stack/skillsFirst Seen
Feb 5, 2026
Security Audits
Installed on
mcpjam2
claude-code2
replit2
junie2
windsurf2
zencoder2