Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Implements a formal evaluation framework for Claude Code sessions to enable reliable, test-driven AI development.
Scans Tizen application dependencies and kernel files for known security vulnerabilities and CVEs using official Samsung and OpenCVE databases.
Parses and explores Burp Suite project files from the command line to streamline security audits and traffic analysis.
Evaluates and scores multiple code implementations using a standardized five-criteria framework to identify optimal software solutions.
Configures and installs a complete suite of binary reverse engineering and cross-architecture analysis tools.
Compiles gathered facts and validated hypotheses into structured binary analysis reports and actionable intelligence.
Performs deep static analysis on binary files to map structure, decompile code, and identify logic without execution.
Identifies architecture, ABI, and potential capabilities of unknown binary files and firmware blobs using fast fingerprinting techniques.
Generates comprehensive STRIDE-based security threat models by analyzing repository architecture and data flows.
Secures Move smart contracts through comprehensive fuzzing, property testing, and vulnerability detection for Aptos, Sui, and Movement blockchains.
Analyzes binary execution and runtime behavior through emulation, debugging, and syscall tracing.
Manages macOS Mobile Device Management (MDM) and authentication states using topological cobordism and triadic logic.
Performs semantic diffing and triadic verification on Model Context Protocol (MCP) specifications to detect breaking changes and validate compliance.
Generates mechanically verified cryptographic proofs and audit trails for event-sourced systems to ensure consistency, security, and deterministic replay.
Orchestrates the Tizen certification lifecycle by coordinating TCT test execution, compliance verification, and documentation.
Performs comprehensive Ruby codebase audits using principles from industry legends like Sandi Metz and Kent Beck to ensure maintainability and performance.
Manages sensitive credentials using the hardware-backed macOS Keychain with mathematically balanced GF(3) operations.
Validates staged Ruby changes against industry-leading design principles and best practices before you commit.
Performs deep, line-by-line code analysis to establish architectural context for security audits and bug detection.
Facilitates end-to-end testing and browser automation for local web applications using Python Playwright scripts and server management utilities.
Manages encrypted secrets using age encryption and mathematical GF(3) triadic conservation for secure, git-safe configuration.
Streamlines the setup, configuration, and resolution of PHPStan static analysis errors within WordPress plugins and themes.
Prevents agent actions by verifying minimal skill coverage using ε-machine causal state modeling.
Identifies and overcomes common fuzzing bottlenecks to maximize code coverage and bug discovery during security testing.
Audits codebases for testability design patterns and identifies business logic entangled with side effects.
Performs predicate-level semantic diffing and triadic verification for Model Context Protocol specifications to ensure version compatibility.
Enhances security testing effectiveness by identifying and overcoming technical barriers that prevent fuzzers from reaching deep code paths.
Implements protocol-aligned value extraction and transaction fee mechanisms based on Stanford FDCI research.
Automates vulnerability detection across codebases, dependencies, and secrets using industry-standard security tools.
Analyzes git history to map security ownership, calculate bus factor for sensitive code, and identify orphaned repository hotspots.
Scroll for more results...