Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Enforces a strict Red-Green-Refactor workflow to ensure high-quality, verified production code through test-first implementation.
Implements and manages comprehensive OAuth2 and OpenID Connect authentication pipelines within the JUDO Runtime Core.
Implements adversary simulation principles and security auditing workflows based on the MITRE ATT&CK framework.
Implements secure subdomain isolation, strict cookie scoping, and token-bound communication patterns for WebSpec environments.
Enforces a rigorous four-phase debugging methodology to identify root causes and implement permanent fixes for complex software issues.
Analyzes and inspects network traffic using Wireshark for security audits, performance troubleshooting, and protocol analysis.
Implements secure smart contract development patterns and audits Solidity code for common blockchain vulnerabilities.
Master memory acquisition and forensic analysis to investigate security incidents and analyze malware behavior from RAM captures.
Provides comprehensive guidance and implementation patterns for the Bash Automated Testing System (Bats) to ensure robust shell script quality.
Conducts comprehensive security audits, vulnerability scans, and network assessments using industry-standard tools and methodologies.
Implements GDPR-compliant data processing, consent management systems, and privacy-by-design controls for applications handling EU personal data.
Implements robust end-to-end testing suites using Playwright and Cypress to ensure application reliability and prevent regressions.
Identifies system vulnerabilities and security risks using the industry-standard STRIDE threat modeling methodology.
Enforces a mandatory evidence-first workflow by requiring successful command execution before any work is marked as complete.
Transforms entire codebases into enterprise-grade, production-ready systems through autonomous deep-scanning and automated refactoring.
Implements robust Python testing strategies using pytest, fixtures, and mocking to ensure code reliability and high coverage.
Maps identified security threats to specific controls and mitigations to strengthen system defenses and prioritize remediation.
Master the art of reverse engineering with comprehensive patterns for disassembly, decompilation, and binary logic reconstruction.
Transforms threat analysis and business context into actionable security requirements, user stories, and test cases.
Conducts professional web application security testing and vulnerability assessment using Burp Suite's integrated toolset.
Enables automated end-to-end testing and UI interaction for local web applications using Playwright and integrated server management.
Executes comprehensive web application security testing and vulnerability scanning using Burp Suite's integrated toolset.
Analyzes network traffic using Wireshark to capture, filter, and troubleshoot network protocols and security anomalies.
Remediates security vulnerabilities identified by DryRunSecurity by applying context-aware fixes grounded in authoritative documentation.
Implements robust security patterns for APIs, including authentication, authorization, input validation, and protection against common vulnerabilities.
Performs advanced reconnaissance and vulnerability discovery for internet-exposed devices using the Shodan search engine.
Secures backend services by implementing robust authentication, authorization, input validation, and rate-limiting patterns.
Performs systematic privilege escalation assessments on Linux systems to identify and exploit security misconfigurations for root-level access.
Guides users through the complete penetration testing lifecycle, from reconnaissance and vulnerability scanning to exploitation and professional reporting.
Executes comprehensive SQL injection vulnerability assessments to identify database flaws and validate input sanitization.
Scroll for more results...