security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Conducts comprehensive, agent-led code reviews and security audits with actionable fixes and clear pass/fail verdicts.
Organizes software implementation into test-driven vertical slices that deliver demonstrable value in every development cycle.
Manages and monitors SSL/TLS certificates by checking expiry dates, facilitating renewals, and auditing installed credentials.
Manages and monitors SSL/TLS certificates by checking expiry dates, performing renewals, and listing installed certificates.
Automates the orchestration, execution, and cleanup of comprehensive integration test suites within the Claude Code environment.
Automates the creation, execution, and reporting of comprehensive API test suites for REST and GraphQL services.
Scans databases for vulnerabilities and automates the implementation of security controls and compliance standards.
Implements comprehensive assessment methodologies and rubrics for evaluating LLM responses, code quality, and agent performance.
Analyzes source code for detectability threats and timing side channels to prevent unauthorized inference of system interactions.
Traces application data from input sources to storage sinks to identify security vulnerabilities and trust boundary violations.
Audits source code for SQL, NoSQL, and command injection vulnerabilities to align with OWASP Top 10 security standards.
Analyzes implementation plans and architecture designs to identify security vulnerabilities before a single line of code is written.
Identifies authorization vulnerabilities and privilege escalation paths within your source code using the STRIDE threat modeling framework.
Automatically initializes and configures Doc Detective to validate procedural documentation through intelligent test generation and iterative fixing.
Simulates realistic exploit chains and scores vulnerability exploitability using the PASTA threat modeling framework.
Analyzes source code and data structures to detect PII exposure and re-identification risks in anonymized datasets.
Verifies documentation procedures by converting them into executable Doc Detective test specifications and validating them automatically.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Identifies and remediates hardcoded credentials, API keys, and sensitive tokens across source code and git history.
Streamlines API testing workflows using modern tools like Bruno, Postman, and contract testing frameworks to ensure backend reliability.
Analyzes source code to identify and mitigate linkability threats where user data can be correlated across services, sessions, or contexts.
Maps application attack surfaces and technical boundaries to create comprehensive data flow diagrams for threat modeling.
Identifies and analyzes potential threats by profiling actors and mapping attack vectors to the MITRE ATT&CK framework using the PASTA methodology.
Manages persistent security preferences, tool thresholds, and scan exclusions for integrated application security workflows.
Analyzes serverless applications for security vulnerabilities including overprivileged IAM policies, event injection, and insecure configuration.
Identifies security weaknesses and maps vulnerabilities to CWE identifiers using the PASTA threat modeling methodology.
Audits source code to identify and mitigate unauthorized personal data (PII) exposure in logs, APIs, and third-party integrations.
Teaches application security through interactive, guided walkthroughs using your own codebase as the primary teaching material.
Visualizes the current security posture of a project by aggregating scan results and tracking code changes since the last audit.
Maps and inventories every application entry point to identify potential security exposure and undocumented interfaces.
Scroll for more results...