security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Performs comprehensive security audits based on the OWASP Top 10 vulnerabilities using parallel subagent analysis.
Analyzes GraphQL endpoints and schemas for critical security vulnerabilities like introspection leaks, depth abuse, and missing authorization.
Analyzes code coverage metrics and implements testing patterns to improve software quality and reliability.
Generates and applies production-ready code fixes for security vulnerabilities and findings identified within your codebase.
Conducts sequential, risk-centric threat modeling using the 7-stage PASTA framework to align security findings with business objectives.
Defines business objectives and critical assets to anchor threat modeling in organizational impact.
Automates comprehensive privacy threat modeling using the LINDDUN framework to identify data protection risks and regulatory gaps.
Automates Ark Dashboard UI testing and screenshot generation for pull requests using Playwright and Kubernetes.
Analyzes codebases for the SANS/CWE Top 25 most dangerous software weaknesses to identify and fix critical security vulnerabilities.
Validates security remediations by re-running scanners and performing deep AI code analysis to confirm vulnerabilities are fully resolved.
Generates comprehensive security reports from vulnerability findings, scanner results, and analysis data.
Analyzes source code to identify and remediate broken access control vulnerabilities including IDOR, CORS leaks, and privilege escalation.
Analyzes source code to identify security logging failures, sensitive data exposure in logs, and improper monitoring configurations.
Streamlines CVE research and automates security patch workflows for the Ark agentic resource platform.
Analyzes REST and RPC APIs for security vulnerabilities aligned with the OWASP API Security Top 10.
Secures applications by identifying file upload vulnerabilities like path traversal, zip slip, and missing server-side validation.
Generates intelligent, context-aware fuzz test inputs and security test cases by analyzing application input parsers and data handlers.
Enriches security findings by mapping vulnerabilities to the MITRE ATT&CK framework to visualize threat patterns and attack chains.
Analyzes source code to identify and mitigate Server-Side Request Forgery (SSRF) vulnerabilities and unauthorized internal network access.
Identifies and remediates common security vulnerabilities and penetration testing findings within the Ark framework.
Executes and authors end-to-end tests for Ark agentic resources using the Chainsaw testing framework.
Explains complex security frameworks, vulnerability categories, and specific findings using real-world examples from your own codebase.
Visualizes the current security posture of a project by aggregating scan results and tracking code changes since the last audit.
Analyzes source code for repudiation threats by identifying missing audit logs, insufficient event tracking, and log tampering vulnerabilities.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Identifies security vulnerabilities related to unauthorized data modification and injection attacks using the STRIDE threat model.
Identifies and audits source code for privacy threats related to undisclosed data collection, missing consent mechanisms, and transparency gaps.
Analyzes codebase architecture, tech stacks, and data sensitivity to recommend a prioritized security testing strategy.
Automates the creation, execution, and validation of unit, integration, and regression tests to ensure skill reliability.
Implements methodical debugging techniques and profiling tools to identify and resolve complex software bugs across multiple programming stacks.
Scroll for more results...