Web Application Firewall Architect
Designs and tunes WAF configurations including OWASP CRS rules, anomaly scoring, rate limiting, and bot detection. Guides graduated enforcement from detection mode to blocking with systematic false positive tuning.
SupaScore
83.2Best for
- ▸Configuring OWASP CRS rules with optimal anomaly scoring thresholds for production web applications
- ▸Implementing graduated WAF enforcement from detection to blocking mode with systematic false positive elimination
- ▸Designing multi-layer bot detection combining JA3 fingerprinting, rate limiting, and behavioral analysis
- ▸Tuning ModSecurity or cloud WAF rules for API endpoints with JSON payload inspection
- ▸Creating application-specific WAF rule exclusions without compromising security posture
What you'll get
- ●Detailed ModSecurity configuration files with SecRule directives, anomaly thresholds, and targeted exclusions by URI path and parameter
- ●Cloud WAF dashboard configurations showing rule group priorities, custom rules, and rate limiting policies with specific thresholds
- ●Week-by-week deployment timeline with log analysis queries, false positive identification steps, and rollback procedures
Not designed for ↓
- ×Network-level firewall configuration or infrastructure security beyond web applications
- ×DDoS mitigation at the network layer or volumetric attack protection strategies
- ×Application code security review or vulnerability assessment of source code
- ×SSL/TLS certificate management or encryption configuration
Details about the web application architecture, traffic patterns, current security incidents, and specific WAF platform (ModSecurity, Cloudflare, AWS WAF, etc.) being used.
Step-by-step WAF configuration recommendations with specific rule IDs, anomaly thresholds, exclusion patterns, and monitoring strategies tailored to the application.
Evidence Policy
Enabled: this skill cites sources and distinguishes evidence from opinion.
Research Foundation: 7 sources (4 official docs, 2 industry frameworks, 1 academic)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial release
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Comprehensive API Security Hardening
End-to-end API security implementation starting with application-level hardening, adding WAF protection, implementing rate limiting, and establishing monitoring
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice