Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Identifies known vulnerabilities in Tizen application dependencies and kernel versions using the OpenCVE database and Samsung security updates.
Audits web and mobile applications for WCAG 2.2 AA compliance using automated tools, manual findings, and deep code analysis.
Implements advanced fuzzing campaigns using the LibAFL framework to identify software vulnerabilities and memory safety issues.
Generates comprehensive unit, integration, and E2E test suites automatically while learning from your project's specific testing style.
Validates and audits tizen-manifest.xml privilege declarations to ensure security compliance and proper resource access.
Performs security-focused analysis of code diffs and pull requests leveraging Trail of Bits' industry-leading expertise.
Enforces a strict evidence-first workflow by requiring fresh command output and verification before any task is marked as complete.
Validates pseudo-code requirements to identify missing logic, security gaps, and edge cases before implementation begins.
Implements von Holst’s reafference theory to distinguish self-generated system actions from external anomalies through predictive signal matching.
Implements neuroscience-based reafference theory to distinguish self-generated AI actions from external anomalies and threats.
Performs automated coverage-guided fuzz testing for Rust applications using the cargo-fuzz tool and libFuzzer engine.
Reviews security patches and bug fixes to ensure they are complete, correct, and free of unintended side effects.
Conducts deterministic, AI-enhanced security scans with ternary classification to ensure reproducible vulnerability detection across any environment.
Guides the Red-Green-Refactor cycle to ensure high-quality, verified code through test-first development.
Executes untrusted code in secure, isolated Linux microVMs for AI agents and multi-tenant applications.
Generates SMACK mandatory access control policy files to ensure process isolation and secure resource access for Tizen applications.
Refactors codebases using a TDD approach to improve internal quality, performance, and race safety without altering external behavior.
Configures robust security HTTP headers and Content Security Policies to protect web applications from common vulnerabilities.
Identifies, reports, and remediates security vulnerabilities in project dependencies across multiple programming languages.
Performs high-speed static analysis and security scanning to identify vulnerabilities and enforce custom code patterns.
Generates comprehensive, production-ready test suites for JavaScript, TypeScript, and Python using frameworks like Jest, Pytest, and Playwright.
Standardizes the modification and performance benchmarking of secret detection rules to ensure high-speed, accurate scanning.
Enforces maximal security isolation for Signal authentication using nested VM and container boundaries with colored operad constraints.
Generates secure, production-ready Solidity smart contracts using OpenZeppelin standards and industry best practices.
Validates and secures Polar.sh billing integrations by checking webhooks, signatures, and environment configurations.
Generates custom Semgrep rules to detect security vulnerabilities and logic bugs within source code.
Executes untrusted code and system commands in secure, isolated microVMs to protect the host environment.
Implements production-ready security patterns to protect web applications against common vulnerabilities like XSS, CSRF, and SQL injection.
Automates the standard local validation and testing suite for the Tribal Village Nim project.
Parses and analyzes Static Analysis Results Interchange Format (SARIF) files to streamline security vulnerability management and tool integration.
Scroll for more results...