Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Automates the creation of professional compliance and security audit reports for major regulatory standards like HIPAA, PCI DSS, and SOC 2.
Scans container images and running containers for vulnerabilities using industry-standard tools like Trivy and Snyk.
Validates API contracts using consumer-driven testing and OpenAPI specifications to ensure seamless compatibility between providers and consumers.
Validates API contracts and ensures backward compatibility using Pact and OpenAPI specifications.
Validates and audits Cross-Origin Resource Sharing (CORS) configurations to identify security vulnerabilities and ensure compliant web access policies.
Analyzes and validates Cross-Origin Resource Sharing (CORS) configurations to identify security vulnerabilities and ensure policy compliance.
Identifies and validates Cross-Site Request Forgery (CSRF) protection mechanisms in web applications to prevent unauthorized state-changing attacks.
Validates web application endpoints and security configurations to identify and remediate Cross-Site Request Forgery (CSRF) vulnerabilities.
Audits web applications for Cross-Site Request Forgery vulnerabilities by validating security tokens, cookie attributes, and endpoint protections.
Performs comprehensive security audits and vulnerability assessments for PostgreSQL and MySQL databases using OWASP standards.
Automates the creation of robust database testing workflows through realistic data generation, transaction management, and schema validation.
Automates database testing workflows by generating realistic test data, managing transactions for clean state rollbacks, and validating schemas.
Scans source code and configuration files for PII leaks, security vulnerabilities, and data privacy compliance issues.
Identifies sensitive data exposure and compliance violations across codebases and configuration files.
Analyzes project dependencies to identify security vulnerabilities, outdated packages, and license compliance risks across multiple package managers.
Analyzes project dependencies to identify security vulnerabilities, outdated packages, and license compliance risks across multiple languages.
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple package managers.
Analyzes project dependencies across multiple package managers to identify security vulnerabilities, outdated packages, and license compliance risks.
Generates comprehensive end-to-end test scripts for web applications using industry-standard frameworks like Playwright and Cypress.
Generates comprehensive end-to-end test suites using Playwright, Cypress, or Selenium to automate and validate browser-based user workflows.
Secures sensitive information by performing automated encryption and decryption tasks using industry-standard algorithms like AES and RSA.
Secures sensitive files and data using industry-standard encryption algorithms directly within the Claude Code environment.
Scans applications and data systems to identify GDPR compliance violations and provide actionable privacy recommendations.
Automates GDPR compliance audits by scanning applications and data systems for privacy violations and regulatory gaps.
Scans codebases and infrastructure configurations to identify potential HIPAA violations and ensure secure handling of protected health information.
Audits codebases, infrastructure configurations, and documentation to identify potential HIPAA compliance violations and security risks.
Identifies potential security vulnerabilities by scanning source code for missing or insufficient input validation and sanitization.
Scans source code for security vulnerabilities related to improper input validation, sanitization, and common web exploits.
Scans source code to identify and mitigate input validation vulnerabilities like SQL injection and cross-site scripting.
Scans source code to identify and mitigate input validation vulnerabilities like SQL injection, XSS, and command injection.
Scroll for more results...