home / skills / jeremylongshore / claude-code-plugins-plus-skills / password-hash-generator
This skill guides you through password hash generator setup, generates production-ready code, and validates outputs following security best practices.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill password-hash-generatorReview the files below or copy the command above to add this skill to your agents.
---
name: "password-hash-generator"
description: |
Generate password hash generator operations. Auto-activating skill for Security Fundamentals.
Triggers on: password hash generator, password hash generator
Part of the Security Fundamentals skill category. Use when working with password hash generator functionality. Trigger with phrases like "password hash generator", "password generator", "password".
allowed-tools: "Read, Write, Grep, Bash(npm:*)"
version: 1.0.0
license: MIT
author: "Jeremy Longshore <[email protected]>"
---
# Password Hash Generator
## Overview
This skill provides automated assistance for password hash generator tasks within the Security Fundamentals domain.
## When to Use
This skill activates automatically when you:
- Mention "password hash generator" in your request
- Ask about password hash generator patterns or best practices
- Need help with essential security skills covering authentication, input validation, secure coding practices, and basic vulnerability detection.
## Instructions
1. Provides step-by-step guidance for password hash generator
2. Follows industry best practices and patterns
3. Generates production-ready code and configurations
4. Validates outputs against common standards
## Examples
**Example: Basic Usage**
Request: "Help me with password hash generator"
Result: Provides step-by-step guidance and generates appropriate configurations
## Prerequisites
- Relevant development environment configured
- Access to necessary tools and services
- Basic understanding of security fundamentals concepts
## Output
- Generated configurations and code
- Best practice recommendations
- Validation results
## Error Handling
| Error | Cause | Solution |
|-------|-------|----------|
| Configuration invalid | Missing required fields | Check documentation for required parameters |
| Tool not found | Dependency not installed | Install required tools per prerequisites |
| Permission denied | Insufficient access | Verify credentials and permissions |
## Resources
- Official documentation for related tools
- Best practices guides
- Community examples and tutorials
## Related Skills
Part of the **Security Fundamentals** skill category.
Tags: security, authentication, validation, owasp, secure-coding
This skill automates password hash generator operations within the Security Fundamentals domain. It helps generate secure password hashes, produce recommended configurations, and validate outputs against common standards. The skill is designed to produce production-ready code snippets and actionable guidance for authentication and storage scenarios.
When triggered, the skill inspects requested hashing requirements (algorithm, salt, iterations, output format) and generates code and configuration tailored to the environment. It follows industry best practices—unique salts, strong KDFs (Argon2, bcrypt, PBKDF2), and appropriate iteration/work-factor settings—and includes validation checks to detect weak parameters. The output includes example code, command-line snippets, and notes on deployment and migration.
Which hash algorithm should I choose?
Prefer Argon2id for new systems; bcrypt or PBKDF2 are acceptable where Argon2 is unavailable. Avoid general-purpose hashes like MD5 or SHA1 for passwords.
How should I handle migrations from old hashing schemes?
Implement on-login rehashing: verify with the old method, then rehash with the new KDF and store the updated record. Add version metadata to each hash.
What salt length and format are recommended?
Use a cryptographically secure random salt of at least 16 bytes, stored alongside the hash in binary or base64 form.