Search Skills
Search across 54932 indexed skills
posthog-security-basics
Secure PostHog API key management, least-privilege access, and secret rotation. PostHog has two key types with very different security profiles: the P...
supabase-security-basics
Supabase exposes a Postgres database directly to the internet via PostgREST. Every table without Row Level Security enabled is fully readable and writ...
retellai-security-basics
Implementation patterns for Retell AI security basics — voice agent and telephony platform. Completed retellai-install-auth setup import Retell from '...
mindtickle-security-basics
MindTickle integrations process employee PII through SCIM provisioning (names, emails, job titles, manager chains) and HR-sensitive data like course c...
deepgram-security-basics
Security best practices for Deepgram integration: scoped API keys, key rotation, Deepgram's built-in PII redaction feature, client-side temporary keys...
flexport-security-basics
Flexport manages global freight logistics containing shipping manifests, customs declarations, commercial invoices, and supply chain partner data. A b...
databricks-security-basics
Implement Databricks security: secret scopes for credential storage, token rotation, least-privilege access via Unity Catalog grants, and security aud...
onenote-security-basics
OneNote Graph API security changed fundamentally on March 31, 2025, when Microsoft deprecated app-only authentication for OneNote endpoints. Every int...
performing-security-code-review
Conducts security-focused code reviews by scanning source files for common vulnerability patterns including SQL injection, XSS, authentication flaws, ...
lucidchart-security-basics
Lucidchart documents often contain sensitive business diagrams — org charts, network topologies, database schemas, and architecture plans that reveal ...
veeva-security-basics
Guidance for security basics with Veeva Vault REST API, VQL queries, and VAPIL Java SDK. Authentication: Session-based (username/password or OAuth 2.0...
ramp-security-basics
Implementation patterns for Ramp security basics using the Developer API with OAuth2 authentication. Completed ramp-install-auth setup import os, requ...