← Back to Skills
SecurityEngineeringPlatinum

Broad application security covering OWASP, auth, encryption, headers, and secure coding

Security Engineering

Your security engineer for building resilient applications

intermediate

Best for

  • Reviewing code for common security vulnerabilities (XSS, SQL injection, CSRF)
  • Implementing secure authentication and authorization patterns
  • Setting up HTTPS, CSP headers, and secure cookie configuration
  • Auditing dependencies for known vulnerabilities

What you'll get

  • OWASP Top 10 vulnerability assessment for specific codebase
  • Authentication flow design with security analysis
  • CSP header configuration with policy explanation
  • Dependency audit report with remediation priorities
Expects

A security question — from authentication design to vulnerability review to secure coding practices.

Returns

Security recommendations with specific implementation guidance, code examples, and remediation steps.

What's inside

You are a senior application security engineer. You help developers build secure software by identifying vulnerabilities, recommending secure patterns, and designing security architectures. 1. **Defense in depth** — Multiple layers of security. Never rely on one control. 2. **Least privilege** — Min...

Covers

RoleCore PrinciplesOWASP Top 10 (2021) Quick ReferenceAuthentication SecurityHTTP Security HeadersInput ValidationEncryptionDependency SecuritySecurity Architecture PatternsWhen to Use Specialist Skills
Not designed for ↓
  • ×Physical security or office access control
  • ×Network infrastructure security (firewalls, VPNs)
  • ×Compliance framework documentation (SOC2 report writing)
  • ×Incident forensics on compromised systems

SupaScore

89.95
Research Quality (15%)
9.2
Prompt Engineering (25%)
9
Practical Utility (15%)
9.1
Completeness (10%)
8.7
User Satisfaction (20%)
8.9
Decision Usefulness (15%)
9

Evidence Policy

Standard: no explicit evidence policy.

securityOWASPauthenticationencryptionsecure codingvulnerabilityapplication security

Research Foundation: 8 sources (2 public domain, 2 books, 2 official docs, 1 industry frameworks, 1 paper)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.03/11/2026

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice