Skip to content
#

security-best-practices

Here are 31 public repositories matching this topic...

The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.

  • Updated May 27, 2025
AI-API-Security-Best-Practices

The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ChatGPT in web applications and to provide best practices for mitigating these risks.

  • Updated Dec 6, 2025

A comprehensive Solidity Style Guide to ensure consistent, readable, and maintainable smart contracts. Features include coding conventions, best practices for gas optimization and security, standardized naming, and effective documentation techniques. Ideal for developers seeking to improve their Solidity projects.

  • Updated Jun 8, 2024

Master the AZ-104 certification with a comprehensive guide that seamlessly integrates Azure administration expertise and DevOps best practices for cloud

  • Updated Nov 1, 2025
  • Shell

A model-agnostic security framework that brings secure-by-default practices to AI-assisted software development. This project provides a curated ruleset of security workflows, reusable command templates, and automated validations designed to catch misconfigurations, enforce compliance, and harden code during generation and review.

  • Updated Nov 19, 2025
  • Python

secure JWT Authentication with Refresh Token flow using ASP.NET Core Minimal API. Includes access token expiry handling, refresh token rotation, in-memory token store, middleware-based auth, and clean end-to-end API security implementation—ideal for learning modern backend authentication.

  • Updated Dec 2, 2025
  • C#

Design and implement a resilient API gateway on Amazon Web Services (AWS) to ensure high availability, automatic failover, and secure access to endpoints without user authentication. Simplify API management and proxy 3rd party APIs with ease.

  • Updated Sep 4, 2023

AWS incident simulation documenting recovery from loss of MFA access after offboarding failure. Covers IAM investigation, CLI recovery, internal verification, RCA, and preventive measures — based on SME experience in AWS account security.

  • Updated Oct 2, 2025

Improve this page

Add a description, image, and links to the security-best-practices topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the security-best-practices topic, visit your repo's landing page and select "manage topics."

Learn more