Explora nuestra colección completa de Habilidades de Claude que extienden las capacidades de los agentes de IA.
Builds and configures custom, modular fuzzers for advanced security research and vulnerability detection.
Detects and analyzes timing side-channel vulnerabilities in cryptographic code to prevent secret data leakage.
Prevents wasted development effort by identifying underspecified tasks and asking targeted clarifying questions before implementation begins.
Identifies and categorizes state-changing entry points in smart contract codebases to streamline security audits and map attack surfaces.
Identifies similar vulnerabilities and bugs across codebases using systematic pattern-based analysis and advanced security tool integration.
Integrates OSS-Fuzz continuous fuzzing infrastructure into open-source projects for automated vulnerability detection and security auditing.
Facilitates automated fuzz testing and vulnerability detection for Rust projects using the libFuzzer backend and Cargo.
Searches and extracts security data from Burp Suite project files using regex patterns and command-line tools.
Guides fuzzing engines toward deep code paths by providing domain-specific tokens and protocol-specific keywords.
Generates and optimizes production-quality Semgrep rules for advanced vulnerability detection and security auditing.
Implements advanced property-based testing patterns to identify edge cases and security vulnerabilities in code and smart contracts.
Scans Cosmos SDK modules and CosmWasm contracts to identify security vulnerabilities and consensus-critical issues.
Performs high-integrity security audits of pull requests and code changes by analyzing risk, blast radius, and historical context.
Evaluates codebase security and architectural maturity using the Trail of Bits 9-category framework to generate evidence-based scorecards and improvement roadmaps.
Automates high-performance multi-core fuzzing for C/C++ projects to detect security vulnerabilities and memory corruption issues.
Performs deep static analysis and interprocedural taint tracking to detect complex security vulnerabilities across multi-function code paths.
Performs high-speed static analysis to identify security vulnerabilities and enforce coding standards across your codebase.
Perform coverage-guided fuzz testing for pure Python code and C extensions to detect security vulnerabilities and memory corruption.
Provides deep technical expertise for analyzing, parsing, and verifying DWARF debug information in compiled binaries.
Provides expert guidance and implementation patterns for creating effective fuzzing harnesses across multiple programming languages.
Implements coverage-guided fuzzing for C/C++ projects using the LLVM-integrated libFuzzer toolchain.
Performs rapid security scanning and pattern-based vulnerability detection using Semgrep and Trail of Bits security rules.
Identifies security footguns and error-prone API designs to ensure software is secure by default.
Analyzes and interprets Culture Index assessments to improve hiring, team dynamics, and management coaching.
Verifies that blockchain codebases align perfectly with their whitepapers and technical specifications through rigorous semantic mapping.
Parse and process Static Analysis Results Interchange Format (SARIF) files to automate security audits and vulnerability management.
Verifies that git commits correctly address security audit findings without introducing new bugs or regressions.
Streamlines the installation and configuration of the @dotcms/analytics library in Next.js and React projects to enable content-aware event tracking.
Extracts and saves YouTube video subtitles or transcripts to local text files using command-line tools or automated browser interaction.
Manages and executes complex, long-running tasks through automated decomposition, multi-session tracking, and headless mode auto-continuation.
Scroll for more results...