security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Enforces rigorous testing protocols and mandatory user verification for web applications to eliminate false success claims and ensure production-grade reliability.
Audits Vue 3 and Pinia applications for data loss risks, storage vulnerabilities, and synchronization issues with actionable remediation.
Enforces zero-tolerance verification protocols to prevent Claude Code from making unverified claims or fabricating progress reports.
Identifies non-idiomatic Rust code and suggests high-performance refactoring patterns to improve safety and maintainability.
Audits unsafe Rust code for soundness, memory safety, and proper FFI implementation patterns.
Streamlines the creation and debugging of PHPUnit and Playwright tests for WordPress ActivityPub implementations.
Simplifies unit and integration testing for Vite-based projects by providing specialized configuration, Jest-compatible API guidance, and mocking patterns.
Verifies that completed epic tasks align with original specification requirements using automated review gates and autonomous fix loops.
Analyzes firmware files, detects file types, and extracts embedded filesystems for security research and IoT pentesting.
Scans ONVIF-enabled IP cameras and IoT devices for authentication vulnerabilities and weak credentials.
Performs static security analysis of UEFI and BIOS firmware dumps to detect malware and audit system integrity.
Discovers and enumerates ONVIF cameras and IoT devices using the WS-Discovery protocol for network security assessments.
Analyzes IoT network traffic to detect specialized protocols and identify security vulnerabilities in real-time or from packet captures.
Interacts with embedded device UART consoles for security auditing, vulnerability discovery, and gaining root access.
Performs professional network reconnaissance and port scanning using an optimized two-phase strategy for comprehensive service detection.
Automates the unpacking, resource extraction, and disassembly of Android APK files for security analysis and vulnerability discovery.
Decompiles Android APK files into readable Java source code to facilitate security audits and application analysis.
Implements rigorous security standards for Rust projects through vulnerability auditing, automated fuzzing, and strict unsafe code reviews.
Solves Capture The Flag (CTF) binary exploitation challenges by identifying and exploiting memory corruption vulnerabilities.
Analyzes and exploits cryptographic implementations in compiled binaries to recover flags and keys during CTF challenges.
Performs intensive, evidence-based reverse engineering investigations within Ghidra to decode complex binary behaviors and logic.
Performs systematic initial surveys of binaries to identify key components, suspicious behaviors, and prioritize deeper reverse engineering tasks.
Analyzes binary programs to extract flags, keys, and passwords using systematic static analysis and Ghidra integration.
Assesses and optimizes your codebase for AI agent autonomy and production quality through a multi-pillar health scan.
Performs security assessments and shell interactions with IoT devices via Telnet using automated helper scripts for reliable command execution.
Interacts with IoT hardware UART consoles using picocom for security audits, device enumeration, and bootloader manipulation.
Scans ONVIF-enabled IP cameras and IoT devices for authentication vulnerabilities and weak credentials.
Diagnoses and resolves common development roadblocks during spec-driven implementation and feature delivery.
Implements comprehensive validation strategies and quality gates for spec-driven development cycles.
Streamlines and automates complex Maven test execution workflows for multi-module Java projects.
Scroll for more results...