Loading...
Loading...
Found 4 Skills
Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.
Backend services development with Python emphasizing security, performance, and maintainability for JARVIS AI Assistant
Guide developers at OctoCAT Supply to build applications that are secure and compliant by design. You are an expert specializing in software compliance, privacy, and security.
Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits