Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Automates security audits, vulnerability scanning, and compliance validation for software development workflows.
Enforces the Red-Green-Refactor cycle to ensure test-first development and high code quality.
Protects applications by automating security audits, vulnerability scanning, and environment compliance checks.
Identifies architectural bottlenecks and hidden edge cases by stress-testing software logic at extreme scales.
Generate and run unit and integration tests using pytest and Jest with support for mocks, fixtures, and coverage reporting.
Implements high-quality software using the Red-Green-Refactor cycle and behavior-driven test patterns inspired by Takuto Wada's philosophy.
Automates security validation, vulnerability scanning, and compliance auditing to ensure secure software development cycles.
Generates and runs comprehensive test suites with automated coverage reporting and documentation-backed best practices.
Provides a centralized index of security remediation guides to help developers fix injection, cryptography, authentication, and configuration vulnerabilities.
Validates software architecture by simulating behavior at extreme scales to uncover hidden bottlenecks and production edge cases.
Secures and manages authentication flows between Laravel Sanctum backends and Next.js frontends while preventing environment configuration leaks.
Applies comprehensive security audits and OWASP-aligned checks to identify vulnerabilities in application code and architecture.
Eliminates flaky tests by replacing arbitrary timeouts with condition polling to wait for actual state changes.
Provides actionable code patterns and best practices to fix SQL injection, command injection, and cross-site scripting (XSS) across multiple programming languages.
Maintains Python project health by auditing security vulnerabilities and managing version compatibility in pyproject.toml.
Enforces rigorous verification protocols by requiring fresh command evidence before any task is marked as complete or fixed.
Guides developers through the Test-Driven Development (TDD) inner loop to implement software features incrementally based on acceptance criteria.
Applies adversarial thinking and robust security patterns to design, review, and harden software systems against vulnerabilities.
Verifies code refactors deterministically using AST-based comparison to ensure structural changes don't introduce unintended logic modifications.
Configures and optimizes Static Application Security Testing (SAST) tools to automate vulnerability detection within the development lifecycle.
Analyzes Go test files to identify flakiness, complexity, and testing anti-patterns to improve suite reliability.
Identifies a project's technology stack, architecture, and security-sensitive features to streamline audits and analysis.
Performs deep, multi-dimensional codebase audits and structural analysis using advanced AST-based intelligence.
Investigates test coverage and quality using AST-based callers analysis to identify untested code and critical gaps.
Enforces rigorous, evidence-based verification workflows before any claims of task completion or code correctness.
End of results