Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Optimizes test suites with expert guidance on Vitest 3.x features, including the Annotation API, enhanced mocking, and workspace configurations.
Enforces modern Git security protocols including signed commits, zero-trust workflows, and proactive secret scanning.
Integrates comprehensive security scanning into Azure Pipelines using Microsoft Defender for Cloud to automate vulnerability detection.
Implements high-velocity trunk-based development and AI-driven security scanning for modern GitHub repositories.
Automates the UI testing workflow by using screenshots and Claude Vision to identify layout issues and visual bugs without writing test code.
Automates visual quality assurance by capturing and analyzing screenshots across web and mobile platforms using Claude's vision capabilities.
Implements comprehensive security testing strategies including SAST, DAST, and vulnerability assessments to secure applications throughout the development lifecycle.
Automatically detects project tech stacks and executes a comprehensive parallel security analysis using relevant scanners and AI subagents.
Analyzes source code for privacy regulation violations including GDPR, CCPA, and HIPAA non-compliance.
Provides instant definitions and framework mappings for application security terms and vulnerability classes.
Identifies and remediates hardcoded credentials, API keys, and sensitive tokens across source code and git history.
Analyzes application workflows and business rules to identify logic-based security vulnerabilities that automated scanners often miss.
Scans source code to identify and mitigate vulnerabilities that could lead to service disruptions or resource exhaustion.
Analyzes implementation plans and architecture designs to identify security vulnerabilities before a single line of code is written.
Calculates business-weighted risk scores and generates prioritized remediation roadmaps for the PASTA threat modeling framework.
Identifies and audits source code for privacy threats related to undisclosed data collection, missing consent mechanisms, and transparency gaps.
Audits source code for SQL, NoSQL, and command injection vulnerabilities to align with OWASP Top 10 security standards.
Traces application data from input sources to storage sinks to identify security vulnerabilities and trust boundary violations.
Enforces a rigorous, four-phase methodology to identify root causes and implement reliable fixes for software bugs.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Automates the creation and management of Golang interface mocks using mockery and go:generate to ensure consistent unit testing.
Simulates realistic exploit chains and scores vulnerability exploitability using the PASTA threat modeling framework.
Analyzes source code and data structures to detect PII exposure and re-identification risks in anonymized datasets.
Identifies authorization vulnerabilities and privilege escalation paths within your source code using the STRIDE threat modeling framework.
Enforces rigorous verification and evidence-based reporting before any task or code change is marked as complete.
Performs comprehensive security and safety assessments of agent skills and MCP servers to identify prompt injection risks, malicious code, and data exfiltration attempts.
Audits source code to identify and mitigate unauthorized personal data (PII) exposure in logs, APIs, and third-party integrations.
Maps application attack surfaces and technical boundaries to create comprehensive data flow diagrams for threat modeling.
Analyzes serverless applications for security vulnerabilities including overprivileged IAM policies, event injection, and insecure configuration.
Identifies security weaknesses and maps vulnerabilities to CWE identifiers using the PASTA threat modeling methodology.
Scroll for more results...