安全权限工程师-会话配置与数据保护

Security engineer skill for session configuration, area isolation, sensitive-state handling, and data-protection boundaries.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "安全权限工程师-会话配置与数据保护" with this command: npx skills add aiweline/security-session-data

Role

This skill owns session configuration safety, area isolation, and protection of sensitive request or user state. It focuses on preventing state leakage, unsafe session handling, and configuration patterns that weaken data protection.

When To Use

  • Use for session configuration, auth-area separation, sensitive state handling, and session-backed data protection.
  • Use for keywords such as session config, login isolation, session key, AreaConfig, state leak, and sensitive data.
  • Use when user state or admin state may leak across areas or requests.

Source Material

  • AI-ENTRY.md
  • CLAUDE.md
  • dev/ai/skills/session-development/SKILL.md
  • dev/ai/skills/config-and-env/SKILL.md
  • dev/ai/skills/weline-framework-runtime/SKILL.md

Responsibilities

  • Keep frontend, backend, and other areas isolated in session behavior.
  • Review session and config changes for state-leak or privilege-leak risk.
  • Protect sensitive data from unsafe storage or request-scope leakage.
  • Require framework abstractions instead of direct global session manipulation.

Workflow

  1. Confirm the area, user state, and sensitive data affected by the task.
  2. Read the current session and config path before changing behavior.
  3. Implement fixes through framework session factories, area config, and controlled config paths.
  4. Check whether state-reset or runtime isolation expectations are relevant under WLS.
  5. Validate through real login, logout, or protected-path behavior.
  6. Record residual risk if data retention or session migration concerns remain.
  7. Coordinate with runtime and QA roles for high-risk validation paths.

Weline Rules

  • Do not pollute global state.
  • Use framework session abstractions instead of raw $_SESSION.
  • Keep module boundaries intact.
  • Prefer small, isolated, testable changes.
  • Provide HTTP or runtime validation evidence where relevant.

Inputs Required

  • The affected session or auth area.
  • The sensitive data or state boundary at risk.
  • Existing configuration keys and session classes involved.
  • Validation path for allowed and denied access or state transitions.

Expected Output

  • A safer session or config implementation that preserves area isolation.
  • Evidence showing state is correctly isolated and protected.
  • Notes about residual risk or migration impact if relevant.

Validation

  • Test login and protected-path behavior across the affected areas.
  • Confirm state does not leak across frontend, backend, or request boundaries.
  • Confirm no direct raw session manipulation bypasses framework abstractions.
  • Confirm sensitive config behavior is exercised through the real flow.

Constraints

  • Do not weaken isolation for convenience in shared flows.
  • Do not store or move sensitive state through ad hoc globals.
  • Do not skip runtime-aware validation when state persistence is part of the issue.
  • Do not change auth behavior silently without documenting the effect on consumers.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Amazon Fba Seller Coach

End-to-end Amazon FBA private-label coach. Use when a seller asks for product research validation, listing audit, PPC strategy, account health diagnosis, bra...

Registry SourceRecently Updated
Security

Pci Dss Readiness Auditor

Audit a payment stack for PCI DSS v4.0 / v4.0.1 readiness — determine cardholder data environment (CDE) scope from data flows (storage, processing, transmiss...

Registry SourceRecently Updated
Security

Gdpr Data Export Tool

Build, audit, and operate Article 15 (right of access) and Article 20 (data portability) data export pipelines for GDPR, plus the equivalent CCPA/CPRA "right...

Registry SourceRecently Updated
Security

Ka88-agent-shield

Professional security audit for AI agents. Checks URLs for SSRF, analyzes content for prompt injection, validates commands for shell injection, integrates wi...

Registry SourceRecently Updated
130Profile unavailable