Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Generates comprehensive test reports with coverage metrics, trend analysis, and stakeholder-ready exports in HTML, PDF, or JSON formats.
Integrates hardware wallets with post-quantum cryptography and AI-driven risk management for secure digital asset protection.
Analyzes Cross-Origin Resource Sharing configurations to identify security vulnerabilities and ensure compliant implementation.
Automates the setup and management of isolated, reproducible test environments using Docker Compose and Testcontainers.
Scans container images and running environments for vulnerabilities using industry-standard security tools like Trivy and Snyk.
Generates mocks, stubs, spies, and fakes automatically to streamline unit testing and dependency isolation across various testing frameworks.
Generates comprehensive test reports with coverage metrics and trend analysis across HTML, PDF, and JSON formats.
Identifies and reports security vulnerabilities, CVEs, and insecure configurations across codebases and dependencies.
Generates realistic, schema-compliant test data including user profiles, product catalogs, and transactional records for software testing and development.
Conducts comprehensive security audits, compliance checks, and vulnerability scans across codebases and cloud infrastructure.
Streamlines SOC2 compliance by automating evidence gathering, identifying security control gaps, and generating readiness reports.
Simplifies SOC2 audit preparation by automating evidence collection, identifying compliance gaps, and generating readiness reports.
Automates the creation of comprehensive security compliance reports for standards like PCI DSS and HIPAA directly within the development workflow.
Generates realistic, schema-compliant synthetic data sets for software testing, database seeding, and performance analysis.
Performs comprehensive security audits by scanning codebases for OWASP Top 10 vulnerabilities and providing actionable remediation guidance.
Performs comprehensive security audits and vulnerability assessments for PostgreSQL and MySQL databases using OWASP guidelines.
Performs deep security vulnerability scans and provides automated, test-driven remediation plans for dependencies and infrastructure.
Audits authentication and authorization implementations to identify security vulnerabilities, misconfigurations, and privilege escalation risks.
Audits and analyzes codebase session management to identify vulnerabilities like session fixation and improper expiration policies.
Identifies session management vulnerabilities and security flaws within your codebase to ensure robust user authentication and protection.
Scans web applications for reflected, stored, and DOM-based Cross-Site Scripting (XSS) vulnerabilities to ensure robust frontend security.
Provides expert-level ISO 13485 quality management system auditing, including risk-based planning, nonconformity identification, and CAPA integration.
Automates and guides Information Security Management System (ISMS) audits and ISO 27001 compliance assessments with expert-level methodology.
Executes automated verification suites to ensure application health and core functionality after deployments or configuration changes.
Facilitates comprehensive EU GDPR and German DSGVO compliance through automated auditing, privacy impact assessments, and regulatory guidance.
Streamlines SOC2 audit preparation by automating evidence gathering, gap analysis, and compliance documentation tasks.
Automates comprehensive security vulnerability testing and penetration scans to identify OWASP Top 10 flaws and injection risks.
Manages and monitors SSL/TLS certificates by tracking expiry dates, initiating renewals, and auditing installed security credentials.
Generates mocks, stubs, and spies for unit testing by automatically analyzing code dependencies and framework requirements.
Implements multi-layered data validation strategies to make software bugs structurally impossible by catching errors at every system layer.
Scroll for more results...