Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Automates browser testing and UI verification for local web applications using Playwright integration.
Evaluates Agentic GraphRAG performance using automated benchmarking and LLM-as-judge scoring rubrics.
Provides systematic methodologies for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Conducts systematic identification, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Identifies and assesses authentication and session management vulnerabilities to protect web applications against unauthorized access.
Implements rigorous test-driven development workflows using pytest-asyncio, fakeredis, and automated fixture management.
Implements and manages comprehensive OAuth2 and OpenID Connect authentication pipelines within the JUDO Runtime Core.
Implements adversary simulation principles and security auditing workflows based on the MITRE ATT&CK framework.
Scans codebases and Git history for exposed credentials, API keys, and sensitive tokens with automated remediation guidance.
Enforces rigorous security standards and full-stack protection protocols across the PatriotForge ERP ecosystem.
Performs comprehensive security audits and vulnerability scans across multiple programming languages and frameworks.
Analyzes and inspects network traffic using Wireshark for security audits, performance troubleshooting, and protocol analysis.
Implements secure smart contract development patterns and audits Solidity code for common blockchain vulnerabilities.
Master memory acquisition and forensic analysis to investigate security incidents and analyze malware behavior from RAM captures.
Provides comprehensive guidance and implementation patterns for the Bash Automated Testing System (Bats) to ensure robust shell script quality.
Conducts comprehensive security audits, vulnerability scans, and network assessments using industry-standard tools and methodologies.
Implements GDPR-compliant data processing, consent management systems, and privacy-by-design controls for applications handling EU personal data.
Implements robust end-to-end testing suites using Playwright and Cypress to ensure application reliability and prevent regressions.
Identifies system vulnerabilities and security risks using the industry-standard STRIDE threat modeling methodology.
Transforms entire codebases into enterprise-grade, production-ready systems through autonomous deep-scanning and automated refactoring.
Implements robust Python testing strategies using pytest, fixtures, and mocking to ensure code reliability and high coverage.
Maps identified security threats to specific controls and mitigations to strengthen system defenses and prioritize remediation.
Master the art of reverse engineering with comprehensive patterns for disassembly, decompilation, and binary logic reconstruction.
Transforms threat analysis and business context into actionable security requirements, user stories, and test cases.
Resolves software defects using a minimalist, reductive approach that prioritizes code deletion and surgical precision.
Conducts professional web application security testing and vulnerability assessment using Burp Suite's integrated toolset.
Validates AI-generated development plans through adversarial challenges and quantitative confidence scoring to ensure production readiness.
Executes comprehensive web application security testing and vulnerability scanning using Burp Suite's integrated toolset.
Analyzes network traffic using Wireshark to capture, filter, and troubleshoot network protocols and security anomalies.
Implements robust security patterns for APIs, including authentication, authorization, input validation, and protection against common vulnerabilities.
Scroll for more results...