Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Builds bespoke sign-in and sign-up authentication flows using Clerk's specialized React hooks and API reference material.
Validates code coverage thresholds and maps test results to specific requirements to ensure software quality homeostasis.
Refactors BDD components including Gherkin scenarios, step definitions, and feature code to eliminate technical debt while maintaining passing tests.
Guides developers through a disciplined Red-Green-Refactor cycle to ensure code quality through test-first development.
Analyzes and troubleshoots network traffic using Wireshark filters, packet capture techniques, and protocol inspection.
Generates comprehensive technical evidence reports to validate environment stability and API functionality before external presentations.
Implements robust Jest testing strategies, TDD workflows, and factory patterns for React and React Native applications.
Implements robust Jest testing strategies, factory patterns, and TDD workflows for maintainable frontend codebases.
Performs comprehensive security assessments and penetration testing workflows for AWS cloud infrastructure.
Implements industry-standard security patterns to protect API endpoints against unauthorized access and common web vulnerabilities.
Provides systematic methodologies for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Provides comprehensive guidance for performing web application security audits and penetration testing using the Burp Suite toolset.
Eliminates trial-and-error programming by enforcing a rigorous four-phase root cause analysis before applying code fixes.
Conducts advanced network reconnaissance and vulnerability discovery using the Shodan search engine and API.
Performs comprehensive security audits and vulnerability assessments across networks, web applications, and cloud environments using industry-standard tools.
Performs expert-level security audits and threat modeling based on the OWASP 2025 framework and modern attack vectors.
Automates the identification and exploitation of security vulnerabilities to elevate user permissions on Linux systems.
Provides a comprehensive framework and command reference for conducting authorized penetration tests and security assessments.
Transforms raw codebases into enterprise-grade, production-ready software by autonomously fixing security, performance, and architectural issues.
Transforms entire codebases into enterprise-grade, production-ready software through autonomous security, performance, and architecture audits.
Identifies and evaluates authentication and session management vulnerabilities in web applications using standardized security testing methodologies.
Implement red teaming strategies and adversary simulation principles based on the MITRE ATT&CK framework.
Standardizes Jest testing workflows with factory functions, mocking strategies, and TDD patterns for React and React Native applications.
Identifies and assesses authentication and session management vulnerabilities to protect web applications against unauthorized access.
Conducts systematic identification, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Implements adversary simulation principles and security auditing workflows based on the MITRE ATT&CK framework.
Analyzes and inspects network traffic using Wireshark for security audits, performance troubleshooting, and protocol analysis.
Guides the implementation of software testing according to established coding standards and best practices.
Provides comprehensive guidance and command-line workflows for network discovery, vulnerability assessment, and security compliance auditing.
Conducts comprehensive security audits, vulnerability scans, and network assessments using industry-standard tools and methodologies.
Scroll for more results...