Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Performs multi-dimensional audits on Odoo codebases to identify security vulnerabilities, code quality issues, and performance bottlenecks.
Enforces a strict test-first development cycle to ensure high-quality code and robust feature implementations.
Empowers Claude with Gemini 3 Flash's 1M token context for high-speed code analysis, prioritized security audits, and root-cause debugging.
Performs deep code quality audits and enforces strict Rust architectural conventions and security standards.
Performs deep architectural reviews, security audits, and complex code analysis by leveraging 100+ AI models via LiteLLM.
Enforces strict privacy standards and data protection protocols including GDPR, CCPA, and consent-first tracking.
Audits Terraform plan files for security vulnerabilities and compliance policy violations to ensure infrastructure integrity before deployment.
Implements secure coding standards and OWASP-aligned patterns to protect applications from vulnerabilities like SQL injection, XSS, and broken authentication.
Automates security assessments, compliance auditing, and infrastructure hardening for Kubernetes and OpenShift clusters.
Implements modern pytest patterns for robust Python unit, integration, and asynchronous testing.
Automates Windows desktop applications using UI Automation (UIA) and Win32 APIs with a focus on security, accessibility, and robust process interaction.
Enforces high-quality, production-ready coding standards using the CLAUDE Framework, TDD, and rigorous security protocols.
Implements industry-standard security protocols and OWASP best practices to safeguard applications against common vulnerabilities and data breaches.
Implements rigorous TDD workflows and comprehensive testing strategies to ensure 80%+ code coverage and production-grade software quality.
Performs comprehensive security, performance, and architecture audits for MongoDB, Express, React, and Node.js projects.
Architects secure, high-performance prompts and orchestrates multi-step LLM workflows with built-in injection prevention and output validation.
Resolves complex software issues across the entire application stack by systematically analyzing UI errors, backend logs, and database states to apply iterative, verified fixes.
Enforces strict code quality standards and pre-commit verification for Breenix kernel development through compiler checks, linting, and log analysis.
Facilitates document-driven kernel debugging through a structured four-phase pattern of problem analysis and evidence collection.
Analyzes and diagnoses GitHub Actions CI/CD failures for Breenix kernel development, identifying root causes like kernel panics, page faults, and test timeouts.
Streamlines the creation of kernel-level integration tests for Breenix using QEMU virtualization and serial signal monitoring.
Diagnoses and resolves complex kernel memory issues including page faults, double faults, and allocator failures within the Breenix operating system.
Generates and maintains structured YAML evaluation files for testing AI agent performance and response accuracy.
Implements a rigorous four-phase scientific framework to identify root causes and eliminate trial-and-error patching.
Automates local web application testing and UI debugging using Playwright and managed server lifecycles.
Orchestrates safe, incremental refactoring of legacy types into new type-safe implementations through a test-first workflow.
Enforces strict test-first development through a deterministic algorithmic decision tree that eliminates rationalizations for skipping tests.
Identifies the fundamental source of software bugs by systematically tracing execution backward through the call stack and implementing strategic instrumentation.
Eliminates flaky tests and race conditions by replacing arbitrary timeouts with intelligent condition polling.
Enforces robust software testing standards by identifying and preventing brittle mocks, production code pollution, and incomplete test data structures.
Scroll for more results...