Security Pass Recipe
securityCreates a playbook
These cards cover the security fundamentals: validating inputs, verifying identity (auth), controlling access (authz), and protecting data (encryption).
Required Cards (4)

Input Validation
introInput validation ensures all user-provided data meets expected formats and constraints before processing.

Authentication
introAuthentication verifies that users are who they claim to be, typically through passwords, tokens, or multi-factor methods.

Authorization
introAuthorization determines what actions an authenticated user is permitted to perform within a system.

Encryption
intermediateEncryption transforms data into an unreadable format that can only be decoded with the correct key.
Output: Security Pass
When to use
You need to review a feature or system for security vulnerabilities.
Steps
Validate All Inputs
Ensure all user inputs are validated and sanitized.
Check Authentication
Verify that users are properly authenticated.
Verify Authorization
Ensure users can only access permitted resources.
Protect Data
Encrypt sensitive data at rest and in transit.
Anti-Patterns to Avoid
- Trusting client-side validation only
- Storing passwords in plain text
Try crafting this recipe on the crafting board
Open Crafting Board