security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Analyzes code changes for security vulnerabilities using LLM-powered reasoning and STRIDE threat modeling patterns.
Automates the setup and management of Docker-based integration tests for Go applications using pre-configured modules and best practices.
Audits Algorand smart contracts for security vulnerabilities including rekeying attacks and access control issues.
Validates staged Ruby changes against industry-leading design principles and best practices before you commit.
Performs comprehensive Ruby codebase audits using principles from industry legends like Sandi Metz and Kent Beck to ensure maintainability and performance.
Formalizes and verifies complex mathematical theorems across music theory, color harmony, and distributed systems using Lean 4.
Generates SMACK policy files and mandatory access control rules to ensure secure process isolation in Tizen environments.
Validates intent-centric architectures by ensuring requests are well-formed, authorized, and resource-balanced before execution.
Performs language-specific security reviews and provides actionable improvements for Python, JavaScript, and Go projects.
Implements triadic balanced governance and staking on the Aptos blockchain using GF(3) conservation principles.
Verifies Claude Code skill activation and keyword trigger functionality using a simple diagnostic word.
Detects memory safety bugs and vulnerabilities in C and C++ programs through runtime instrumentation guidance.
Facilitates end-to-end testing and browser automation for local web applications using Python Playwright scripts and server management utilities.
Validates security patches and fixes to ensure they completely resolve vulnerabilities without introducing new regressions.
Generates custom Semgrep rules to detect specific bug patterns and security vulnerabilities across various programming languages.
Facilitates interaction, integration, and security auditing for the Ostium Protocol perpetual exchange on Arbitrum.
Evaluates and scores multiple code implementations using a standardized five-criteria framework to identify optimal software solutions.
Configures and installs a complete suite of binary reverse engineering and cross-architecture analysis tools.
Compiles gathered facts and validated hypotheses into structured binary analysis reports and actionable intelligence.
Performs deep static analysis on binary files to map structure, decompile code, and identify logic without execution.
Identifies architecture, ABI, and potential capabilities of unknown binary files and firmware blobs using fast fingerprinting techniques.
Analyzes binary execution and runtime behavior through emulation, debugging, and syscall tracing.
Streamlines the setup, configuration, and resolution of PHPStan static analysis errors within WordPress plugins and themes.
Audits codebases for testability design patterns and identifies business logic entangled with side effects.
Automates vulnerability detection across codebases, dependencies, and secrets using industry-standard security tools.
Scans Tizen application dependencies and kernel files for known security vulnerabilities and CVEs using official Samsung and OpenCVE databases.
Validates the syntax and structural integrity of agent skills and commands to ensure error-free execution.
Verifies that source code accurately implements technical specifications and whitepapers to ensure protocol integrity during blockchain audits.
Enhances QA test procedures by automatically capturing and embedding UI element screenshots into documentation.
Secures Move smart contracts through comprehensive fuzzing, property testing, and vulnerability detection for Aptos, Sui, and Movement blockchains.
Scroll for more results...