Role-based access control (RBAC) with permissions and policies. Use for admin dashboards, enterprise access, multi-tenant apps, fine-grained authorization, or encountering permission hierarchies, role inheritance, policy conflicts.
90
88%
Does it follow best practices?
Impact
92%
1.53xAverage score across 3 eval scenarios
Passed
No known issues
Node.js RBAC role hierarchy
Permission class
0%
100%
Wildcard matching
0%
100%
Role class with parent
87%
100%
Recursive hasPermission
50%
100%
RBACSystem maps
100%
100%
403 Forbidden shape
0%
100%
Auth/authz separation
75%
87%
Viewer role — read wildcard
25%
50%
Editor inherits viewer
100%
100%
Admin inherits editor
62%
62%
No hardcoded if-checks
100%
100%
Hierarchy reduces duplication
100%
100%
Python ABAC thread-safe engine
@dataclass Policy
0%
100%
Effect enum
0%
100%
threading.Lock in engine
100%
100%
Lock on add_policy
100%
100%
Shallow copy before eval
87%
100%
DENY short-circuits
0%
44%
Deny by default
100%
100%
Flask 401 unauthenticated
100%
100%
Flask 401 incomplete attrs
40%
100%
Flask 403 access denied
100%
100%
Condition factory functions
100%
100%
Java Spring Security method-level authorization
@EnableWebSecurity
100%
100%
@EnableMethodSecurity prePost
100%
100%
JWT resource server
100%
100%
resource:action permission format
0%
100%
@PreAuthorize on methods
100%
100%
@PostAuthorize present
0%
100%
Custom bean in PreAuthorize
100%
100%
Custom expression root class
100%
100%
isResourceOwner method
44%
100%
hasDepartment method
25%
100%
hasRole + hasAuthority combo
0%
0%
90d6bd7
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.