Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Plans and optimizes test automation efforts using ROI analysis, framework evaluation, and architectural best practices.
Implements modern secure development practices and mitigates vulnerabilities using OWASP Top 10 2025 and CWE Top 25 standards.
Plans and generates comprehensive automated test tasks using Risk-Based Testing methodology and manual testing results.
Applies the Red-Green-Refactor cycle to process documentation by running baseline tests without a skill, identifying loopholes, and iteratively hardening instructions against agent rationalization.
Authors high-quality Gherkin acceptance criteria and BDD feature files for executable specifications.
Analyzes Claude skills across security, quality, utility, and compliance dimensions to provide detailed safety reports and improvement recommendations.
Manages open source license compatibility, obligation tracking, and compliance workflows for software development projects.
Implements secure storage, access, and rotation patterns for sensitive application credentials across cloud and local environments.
Identifies license information for Python packages by analyzing PyPI metadata and verifying source code repositories.
Validates Mojo code for memory safety violations, ownership issues, and pointer-related bugs to ensure high-performance reliability.
Streamlines the creation and execution of PHP unit tests using the Nette Tester framework and conventions.
Implements industry-standard authentication flows including JWT, OAuth 2.0, and Passkeys while ensuring security best practices.
Plans and manages comprehensive test data strategies including synthetic generation, anonymization, and environment-specific provisioning.
Generates clear, testable acceptance criteria using Given-When-Then format and INVEST principles for Behavior-Driven Development (BDD).
Architects consumer-driven contract testing strategies using Pact to ensure API stability and prevent breaking changes.
Manages the end-to-end security vulnerability lifecycle from discovery and risk-based prioritization to remediation and disclosure.
Architects and evaluates modern security systems using the "never trust, always verify" framework for identity-based protection.
Runs comprehensive linting suites including Mojo formatting, Markdown validation, and pre-commit hooks to ensure high code quality standards.
Secures and validates agent success criteria through centralized JSON parsing and defensive injection prevention.
Implement and audit cryptographic operations using industry-standard algorithms, secure hashing, and key management patterns.
Guides software development and infrastructure alignment with ISO 27001, SOC 2, NIST CSF 2.0, and CIS Controls.
Verifies that code implementations align with technical design specifications to ensure architectural compliance and consistency.
Secures software development lifecycles by generating SBOMs, implementing SLSA frameworks, and scanning for dependency vulnerabilities.
Secures containerized applications and Kubernetes clusters through automated hardening, scanning, and policy enforcement.
Generates realistic, domain-specific mock data and test fixtures using Faker.js and factory patterns.
Simplifies snapshot testing in Python by asserting the immutability of complex data structures and managing snapshot files within pytest.
Enforces .NET architectural boundaries and layer constraints using NetArchTest and ArchUnitNET validation rules.
Guides the development of responsible AI systems through comprehensive regulatory compliance frameworks and risk management standards.
Applies rigorous test design techniques like boundary value analysis and decision tables to maximize software testing coverage and defect detection.
Conducts systematic security assessments using STRIDE and DREAD methodologies to identify and mitigate software vulnerabilities during design.
Scroll for more results...