Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Lists environment variable names to verify configurations without exposing sensitive values or secrets.
Implements robust, production-grade test infrastructure and automated suites following strict TDD principles and TypeScript best practices.
Designs and implements comprehensive, behavior-driven software tests across multiple platforms and testing scopes.
Designs and implements comprehensive software test suites using advanced heuristics and industry-standard patterns.
Enables automated end-to-end testing and UI interaction for local web applications using Playwright and integrated server management.
Enforces a rigorous four-phase debugging methodology to identify root causes and implement permanent fixes for complex software issues.
Enforces a strict Red-Green-Refactor workflow to ensure high-quality, verified production code through test-first implementation.
Manages secure OAuth 2.0 flows, JWT token structures, and biometric device binding for the WebSpec ecosystem.
Implements comprehensive Python testing strategies using pytest, mocking, and test-driven development best practices.
Conducts deep security investigations into Django and DRF authorization logic to identify and prevent Insecure Direct Object Reference (IDOR) vulnerabilities.
Identifies error-prone API designs, dangerous configurations, and security footguns to ensure code follows secure-by-default principles.
Reviews and implements code according to the latest OWASP security benchmarks, including Top 10:2025 and Agentic AI safety guidelines.
Guides fuzz testing by providing domain-specific tokens to reach deeper code paths in parsers and protocols.
Scans Cairo smart contracts for critical vulnerabilities including arithmetic overflows, L1-L2 messaging flaws, and signature replay attacks.
Audits Cosmos SDK modules and CosmWasm smart contracts for consensus-critical vulnerabilities and security risks.
Enforces rigorous verification protocols and evidence-based reporting before any task or code change is claimed as complete.
Builds modular, high-performance custom fuzzers using the LibAFL framework for advanced security testing and research.
Implements a rigorous four-phase framework to identify root causes and eliminate trial-and-error debugging during development.
Generates and validates production-quality Semgrep rules to detect security vulnerabilities and complex code patterns using a test-driven approach.
Patches codebases to bypass checksums, non-deterministic states, and validation barriers to improve fuzzer coverage.
Audits codebase for fail-open security vulnerabilities and weak default configurations that risk production exposure.
Validates cryptographic implementations using extensive test vectors to protect against known attacks and edge cases.
Verifies that security audit remediation commits correctly address findings without introducing new bugs.
Audits Algorand smart contracts for 11 critical security vulnerabilities, including rekeying attacks and unchecked transaction fields.
Identifies command-and-control beaconing patterns in network traffic using statistical frequency analysis and jitter calculation.
Establishes and enforces standardized timeframes for patching security vulnerabilities based on severity, threat context, and asset criticality.
Generates and validates production-ready Web Application Firewall (WAF) rules to enhance web security and compliance.
Scans codebases for security vulnerabilities, bugs, and style violations using fast, pattern-based static analysis.
Scans Solana and Anchor programs to identify and remediate critical security vulnerabilities including arbitrary CPI and improper PDA validation.
Executes a comprehensive suite of codebase checks including builds, types, linting, and tests to ensure production readiness.
Scroll for more results...