Toolverse
All skills

groq-security-basics

by jeremylongshore

Apply Groq security best practices for secrets and access control.\nUse when securing API keys, implementing least privilege access,\nor auditing Groq security configuration.\nTrigger with phrases like \

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Category
Security
Views
1

About this skill

Apply Groq security best practices for secrets and access control.\nUse when securing API keys, implementing least privilege access,\nor auditing Groq security configuration.\nTrigger with phrases like \

How to use

  1. Zainstaluj umiejętność w swoim środowisku Claude Code, Codex lub OpenClaw, wskazując repozytorium autora (jeremylongshore/claude-code-plugins-plus-skills). 2. Wyzwól umiejętność frazami takimi jak "groq security", "groq secrets", "secure groq" lub "groq API key security" w kontekście audytu lub konfiguracji bezpieczeństwa. 3. W środowisku deweloperskim utwórz plik .env.local z wpisem GROQ_API_KEY=gsk_... i dodaj .env oraz .env.local do .gitignore, aby zapobiec przypadkowemu commitowi klucza. 4. W produkcji skonfiguruj przechowywanie klucza za pośrednictwem menedżera tajemnic platformy: dla Vercel użyj vercel env add, dla AWS — aws secretsmanager create-secret, dla GCP — gcloud secrets create, dla GitHub Actions — gh secret set. 5. Pamiętaj, że klucze Groq (gsk_) nie mają wariantów ograniczonych — każdy klucz ma pełny dostęp do wszystkich endpointów, dlatego rotacja i izolacja są istotne. 6. Regularnie audytuj konfigurację bezpieczeństwa, sprawdzając, czy klucze są przechowywane wyłącznie w systemach zarządzania tajemnicami i nigdy nie są logowane ani commitowane do kontroli wersji.

Related skills

academic-researcher

by Shubhamsaboo

Academic research assistant for literature reviews, paper analysis, and scholarly writing.\nUse when: reviewing academic papers, conducting literature reviews, writing research summaries,\nanalyzing methodologies, formatting citations, or when user mentions academic research,

Security
1260

backend-security-coder

by sickn33

Expert in secure backend coding practices specializing in input validation, authentication, and API security. Use PROACTIVELY for backend security implementations or security code reviews.

Security
1133

solidity-security

by wshobson

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.

Security
10105

python-expert

by Shubhamsaboo

Senior Python developer expertise for writing clean, efficient, and well-documented code.\nUse when: writing Python code, optimizing Python scripts, reviewing Python code for best practices,\ndebugging Python issues, implementing type hints, or when user mentions Python, PEP 8,

Security
2777

reviewing-code

by CaptainCrouton89

Systematically evaluate code changes for security, correctness, performance, and spec alignment. Use when reviewing PRs, assessing code quality, or verifying implementation against requirements.

Security
1493

qmd

by tobi

Search personal markdown knowledge bases, notes, meeting transcripts, and documentation using QMD - a local hybrid search engine. Combines BM25 keyword search, vector semantic search, and LLM re-ranking. Use when users ask to search notes, find documents, look up information in

Security
1951