ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      brandonwise

      Safety Report

      API Security Best Practices

      @brandonwise

      Guide to implement secure API practices including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabi...

      397Downloads
      0Installs
      0Stars
      1Versions
      API Integration4,971Design & Prototyping842

      Security Analysis

      medium confidence
      Suspicious0.04 risk

      The skill's instructions are coherent with an API security guide, but the runtime instructions reference secrets (e.g., process.env.JWT_SECRET / JWT_REFRESH_SECRET) while the skill metadata declares no required environment variables — a mismatch worth noting before installation.

      Feb 16, 20261 files2 concerns
      Purpose & Capabilityok

      The name and description match the content: guidance and code examples for API security (auth, validation, rate limiting, data protection). No unrelated binaries, installs, or services are requested.

      Instruction Scopenote

      SKILL.md contains concrete implementation guidance and code samples that stay on-topic. It references environment secrets (process.env values) and database operations, but does not instruct the agent to read arbitrary host files, call external endpoints outside standard APIs, or exfiltrate data. The instructions are sufficiently prescriptive to be useful; exercise caution when copy-pasting into production.

      Install Mechanismok

      This is an instruction-only skill with no install spec and no code files executed by the platform. That minimizes install-time risk.

      Credentialsconcern

      The documentation and code samples reference runtime secrets (JWT_SECRET, JWT_REFRESH_SECRET) and database interactions, but the skill's metadata declares no required environment variables or primary credential. This mismatch could lead to confusion about what secrets must be supplied and how they're protected. Requiring those env vars in metadata (or being explicit that the skill will refer to project environment variables) would be more proportionate.

      Persistence & Privilegeok

      The skill does not request always:true and is user-invocable only. It does not ask to modify other skills or system-wide agent settings. Autonomous invocation is allowed (platform default) but not combined with other high-risk flags.

      Guidance

      This appears to be a legitimate API security guide with useful code examples, but note the mismatch: the examples reference JWT secrets (process.env.JWT_SECRET, JWT_REFRESH_SECRET) even though the skill metadata doesn't declare required environment variables. Before using or copying code: (1) keep all secrets out of chat—store them in your environment or a secrets manager; (2) verify and adapt examples to your stack (e.g., secure refresh token storage, HttpOnly cookies, CSRF protections); (3) test in staging and rotate secrets after deployment; (4) confirm the agent will not be given raw secret values in conversation or logs if you enable autonomous invocation. If you want stronger assurance, ask the skill author to declare required env vars and to clarify any external endpoints or persistence expected during runtime.

      Latest Release

      v1.0.0

      Initial release: JWT, OAuth2, rate limiting, input validation, OWASP API Top 10

      More by @brandonwise

      Humanizer

      15 stars

      Secure Auth Patterns

      0 stars

      Secrets Management

      0 stars

      Threat Modeling Expert

      0 stars

      Workspace Cleaner

      0 stars

      SQL Injection Testing

      0 stars

      Published by @brandonwise on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]