security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Identifies security vulnerabilities, Common Vulnerabilities and Exposures (CVEs), and configuration risks within your codebase and dependencies.
Performs automated security audits to identify vulnerabilities, insecure configurations, and known CVEs across your codebase and dependencies.
Detects and mitigates cross-site scripting (XSS) vulnerabilities across HTML, JavaScript, and CSS contexts to secure web applications.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Conducts comprehensive security audits for authentication and session management vulnerabilities in web applications to prevent unauthorized access.
Builds bespoke sign-in and sign-up authentication flows using Clerk's specialized React hooks and API reference material.
Guides developers through a disciplined Red-Green-Refactor cycle to ensure code quality through test-first development.
Analyzes and troubleshoots network traffic using Wireshark filters, packet capture techniques, and protocol inspection.
Implements robust Jest testing strategies, TDD workflows, and factory patterns for React and React Native applications.
Implements robust Jest testing strategies, factory patterns, and TDD workflows for maintainable frontend codebases.
Performs comprehensive security assessments and penetration testing workflows for AWS cloud infrastructure.
Implements industry-standard security patterns to protect API endpoints against unauthorized access and common web vulnerabilities.
Provides systematic methodologies for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Provides comprehensive guidance for performing web application security audits and penetration testing using the Burp Suite toolset.
Eliminates trial-and-error programming by enforcing a rigorous four-phase root cause analysis before applying code fixes.
Conducts advanced network reconnaissance and vulnerability discovery using the Shodan search engine and API.
Performs comprehensive security audits and vulnerability assessments across networks, web applications, and cloud environments using industry-standard tools.
Performs expert-level security audits and threat modeling based on the OWASP 2025 framework and modern attack vectors.
Automates the identification and exploitation of security vulnerabilities to elevate user permissions on Linux systems.
Provides a comprehensive framework and command reference for conducting authorized penetration tests and security assessments.
Transforms raw codebases into enterprise-grade, production-ready software by autonomously fixing security, performance, and architectural issues.
Transforms entire codebases into enterprise-grade, production-ready software through autonomous security, performance, and architecture audits.
Identifies and evaluates authentication and session management vulnerabilities in web applications using standardized security testing methodologies.
Implement red teaming strategies and adversary simulation principles based on the MITRE ATT&CK framework.
Standardizes Jest testing workflows with factory functions, mocking strategies, and TDD patterns for React and React Native applications.
Identifies and assesses authentication and session management vulnerabilities to protect web applications against unauthorized access.
Conducts systematic identification, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Implements adversary simulation principles and security auditing workflows based on the MITRE ATT&CK framework.
Analyzes and inspects network traffic using Wireshark for security audits, performance troubleshooting, and protocol analysis.
Provides comprehensive guidance and command-line workflows for network discovery, vulnerability assessment, and security compliance auditing.
Scroll for more results...