83 boosters for "auth" — AI-graded, open source, ready to install
Configures Rei Qwen3 Coder as an OpenAI-compatible model provider for claude_code environments. Useful for developers needing to integrate Rei endpoints and troubleshoot authentication issues.
A Copilot prompt booster providing architectural patterns and configuration rules for managing a self-hosted homelab stack with Docker Swarm, Traefik, and integrated services. Ideal for developers building or maintaining complex multi-service home infrastructure.
QCO is a lightweight Next.js e-commerce starter kit optimized for Windsurf, providing developers with pre-configured best practices for modern stack components (Drizzle ORM, tRPC, Better Auth, Tailwind). It accelerates e-commerce project setup by eliminating boilerplate configuration for data fetching, validation, and backend communication.
This Cursor rules booster provides v0-style system prompts to help developers build beautiful, modern interfaces using Next.js 15, shadcn/ui, and Supabase authentication. It's ideal for developers using Cursor who want to quickly scaffold full-stack applications with consistent design patterns and best practices.
Windsurf Rules for app2agent provides architectural guidance and codebase conventions for a Next.js 15 backend with Supabase integration and a browser extension built with React/Vite. Developers working on this specific full-stack project benefit from structured rules that ensure consistent implementation across auth, landing, and extension modules.
Enables researchers and academics to systematically search arXiv papers, analyze research content, build literature reviews, and generate citations through a skill designed for Claude Code integration. Useful for students, researchers, and anyone conducting academic research who need structured access to arXiv resources.
This booster automates reconnaissance of LLM API endpoints to identify models, authentication methods, and configuration details for security testing. Red team operators and security researchers benefit from structured enumeration workflows.
A Cursor project rules template that enforces Rails authorization policy implementation standards by configuring glob patterns and basic conventions for the app/policies directory. Useful for Rails developers using Cursor to maintain consistent authorization layer architecture.
SwimTO Cursor Rules provides workspace configuration, security guidelines, and development standards for the swimTO pool scheduling project running on a Raspberry Pi k3s cluster. Developers working on this project benefit from clear port assignments, OAuth/HTTPS requirements, and project structure documentation.
Second Brain MCP is a semantic search engine for your codebase that lets you find code by natural language queries (like "find the auth bug") instead of grep, using embeddings and local SQLite vector search. It's ideal for developers who want faster code navigation and context awareness across large projects.
A skill for analyzing and generating idiomatic Common Lisp libraries based on patterns from renowned CL authors like Edi Weitz and Fukamachi. Useful for AI assistants helping developers create production-quality CL code.
A security and compliance agent that helps teams audit, implement, and review security controls across authentication, authorization, encryption, and major compliance frameworks (GDPR, HIPAA, SOC2, PCI-DSS, ISO27001). Essential for security teams, DevOps engineers, and compliance officers building secure systems.
MCP Server for Section 508 accessibility compliance checking with authentication and multi-page crawling support. Automatically detects VS Code workspace directory for report output.
A read-only MSSQL MCP Server that enables Claude to securely query SQL Server databases with SQL authentication. Developers and data analysts benefit from safe, controlled database access without write permissions.
Provides Cursor IDE context rules for JHipster-generated monolithic applications with JWT authentication and React frontend. Helpful for developers working on JHipster projects in Cursor to understand the project structure and technology stack.
whopctl provides Cursor IDE rules for developers building CLI wrappers around the Whop SDK, establishing shared architecture patterns for resource instantiation, authentication, and error handling. Developers using Whop for app deployment and hosting benefit from consistent project structure and SDK best practices.
A Spanish-language system prompt for the Coopuertos transport cooperative management system that guides AI assistants in helping users authenticate and interact with MCP tools. This booster benefits developers building Spanish-language interfaces for cooperative transport management platforms.
A TypeScript/CLI tool for reading and writing Scrapbox/Cosense pages using Playwright, with authentication support for private projects. Useful for developers who need programmatic access to Scrapbox content in their workflows.
An expert agent for penetration testing and vulnerability assessment that helps security professionals conduct authorized red team operations and identify security weaknesses. Ideal for security engineers, penetration testers, and organizations needing structured ethical hacking guidance.
A Windsurf rules framework for enterprise AWS Cedar authorization with shift-left security practices, policy validation, and automated CI/CD enforcement. Benefits security teams, platform engineers, and developers implementing least-privilege access controls.
Cursor Rules for the Whop CLI wrapper that establishes a shared mental model for projects integrating @whoplabs/whop-client, helping developers maintain SDK contracts and avoid reimplementing authentication/networking logic. Benefits CLI developers building on top of the Whop SDK.
An MCP server that enables Claude to interact with self-hosted Jira instances using Personal Access Token authentication, allowing developers to automate issue management and project workflows directly through Claude.
Zeus is a thematic multi-agent coordinator agent designed for strategic decision-making and performance tracking, but lacks concrete implementation details and practical use cases.
A comprehensive MongoDB security and administration agent that teaches and implements authentication methods (SCRAM/X.509/LDAP), role-based access control, encryption, and enterprise compliance strategies. Ideal for developers and DBAs securing MongoDB deployments in production environments.