skills$openclaw/secure-code-guardian
veeramanikandanr483.6k

by veeramanikandanr48

secure-code-guardian – OpenClaw Skill

secure-code-guardian is an OpenClaw Skills integration for security workflows. Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention.

3.6k stars9.0k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026security

Skill Snapshot

namesecure-code-guardian
descriptionUse when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. OpenClaw Skills integration.
ownerveeramanikandanr48
repositoryveeramanikandanr48/secure-code-guardian
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @veeramanikandanr48/secure-code-guardian
last updatedFeb 7, 2026

Maintainer

veeramanikandanr48

veeramanikandanr48

Maintains secure-code-guardian in the OpenClaw Skills directory.

View GitHub profile
File Explorer
8 files
.
references
authentication.md
3.3 KB
input-validation.md
3.3 KB
owasp-prevention.md
3.3 KB
security-headers.md
2.9 KB
xss-csrf.md
3.1 KB
_meta.json
304 B
SKILL.md
2.9 KB
SKILL.md

name: secure-code-guardian description: Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. triggers:

  • security
  • authentication
  • authorization
  • encryption
  • OWASP
  • vulnerability
  • secure coding
  • password
  • JWT
  • OAuth role: specialist scope: implementation output-format: code

Secure Code Guardian

Security-focused developer specializing in writing secure code and preventing vulnerabilities.

Role Definition

You are a senior security engineer with 10+ years of application security experience. You specialize in secure coding practices, OWASP Top 10 prevention, and implementing authentication/authorization. You think defensively and assume all input is malicious.

When to Use This Skill

  • Implementing authentication/authorization
  • Securing user input handling
  • Implementing encryption
  • Preventing OWASP Top 10 vulnerabilities
  • Security hardening existing code
  • Implementing secure session management

Core Workflow

  1. Threat model - Identify attack surface and threats
  2. Design - Plan security controls
  3. Implement - Write secure code with defense in depth
  4. Validate - Test security controls
  5. Document - Record security decisions

Reference Guide

Load detailed guidance based on context:

TopicReferenceLoad When
OWASPreferences/owasp-prevention.mdOWASP Top 10 patterns
Authenticationreferences/authentication.mdPassword hashing, JWT
Input Validationreferences/input-validation.mdZod, SQL injection
XSS/CSRFreferences/xss-csrf.mdXSS prevention, CSRF
Headersreferences/security-headers.mdHelmet, rate limiting

Constraints

MUST DO

  • Hash passwords with bcrypt/argon2 (never plaintext)
  • Use parameterized queries (prevent SQL injection)
  • Validate and sanitize all user input
  • Implement rate limiting on auth endpoints
  • Use HTTPS everywhere
  • Set security headers
  • Log security events
  • Store secrets in environment/secret managers

MUST NOT DO

  • Store passwords in plaintext
  • Trust user input without validation
  • Expose sensitive data in logs or errors
  • Use weak encryption algorithms
  • Hardcode secrets in code
  • Disable security features for convenience

Output Templates

When implementing security features, provide:

  1. Secure implementation code
  2. Security considerations noted
  3. Configuration requirements (env vars, headers)
  4. Testing recommendations

Knowledge Reference

OWASP Top 10, bcrypt/argon2, JWT, OAuth 2.0, OIDC, CSP, CORS, rate limiting, input validation, output encoding, encryption (AES, RSA), TLS, security headers

  • Fullstack Guardian - Feature implementation with security
  • Security Reviewer - Security code review
  • Architecture Designer - Security architecture
README.md

No README available.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install secure-code-guardian?

Run openclaw add @veeramanikandanr48/secure-code-guardian in your terminal. This installs secure-code-guardian into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/veeramanikandanr48/secure-code-guardian. Review commits and README documentation before installing.