Comprehensive API security guidance covering authentication methods, rate limiting, input validation, CORS, security headers, and protection against OWASP API Top 10 vulnerabilities. Use when designing API authentication, implementing rate limiting, configuring CORS, setting security headers, or reviewing API security.
View on GitHubmelodic-software/claude-code-plugins
security
January 21, 2026
Select agents to install to:
npx add-skill https://github.com/melodic-software/claude-code-plugins/blob/main/plugins/security/skills/api-security/SKILL.md -a claude-code --skill api-securityInstallation paths:
.claude/skills/api-security/# API Security Comprehensive guidance for securing APIs, covering authentication, authorization, rate limiting, validation, and protection against common API attacks. ## When to Use This Skill Use this skill when: - Choosing API authentication methods - Implementing rate limiting - Configuring CORS policies - Setting security headers - Validating API inputs - Preventing data exposure - Protecting against BOLA/IDOR attacks - Implementing request signing - Securing API gateways ## OWASP API Security Top 10 (2023) | Rank | Vulnerability | Description | Mitigation | |------|--------------|-------------|------------| | API1 | Broken Object Level Authorization | Access to unauthorized objects | Object-level authorization checks | | API2 | Broken Authentication | Authentication flaws | Strong authentication, MFA | | API3 | Broken Object Property Level Authorization | Excessive data exposure, mass assignment | Response filtering, allowlists | | API4 | Unrestricted Resource Consumption | DoS via resource exhaustion | Rate limiting, pagination | | API5 | Broken Function Level Authorization | Access to unauthorized functions | Function-level authz checks | | API6 | Unrestricted Access to Sensitive Business Flows | Abuse of business logic | Rate limiting, fraud detection | | API7 | Server Side Request Forgery (SSRF) | Server makes malicious requests | URL validation, allowlists | | API8 | Security Misconfiguration | Improper configuration | Security hardening, automation | | API9 | Improper Inventory Management | Unknown/unmanaged APIs | API inventory, versioning | | API10 | Unsafe Consumption of APIs | Trusting third-party APIs | Validate external responses | ## API Authentication Methods ### Method Comparison | Method | Use Case | Pros | Cons | |--------|----------|------|------| | API Keys | Simple services, internal APIs | Easy to implement | No user context, hard to rotate | | OAuth 2.0 Bearer Tokens | User-delegated access | Standard, scoped | Token management co