security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Generates comprehensive security threat models and data flow diagrams following Bitwarden's formal engagement framework.
Audits React codebases to eliminate redundant useEffect hooks and optimize component performance based on official best practices.
Performs interactive source code security audits using a structured Map & Probe methodology to identify and verify vulnerabilities.
Evaluates system architectures and protocols for overcomplication to propose streamlined, robust design alternatives.
Generates professional-grade security audit reports, issue write-ups, and system security models with objective technical precision.
Automates visual regression testing and pixel-perfect design matching for frontend components using an intelligent auto-fix loop.
Conducts project scoping and security audit effort estimation using logical chunking and automated metric analysis.
Scans and identifies Reflected, Stored, and DOM-based XSS vulnerabilities within web applications and codebases.
Scans web applications for reflected, stored, and DOM-based Cross-Site Scripting (XSS) vulnerabilities to ensure robust frontend security.
Identifies and reports security vulnerabilities, CVEs, and insecure configurations across codebases and dependencies.
Automates UI consistency checks by capturing screenshots and comparing them against established baselines using industry-standard tools.
Generates comprehensive test reports with coverage metrics, trend analysis, and stakeholder-ready exports in HTML, PDF, or JSON formats.
Generates comprehensive test reports with coverage metrics and trend analysis across HTML, PDF, and JSON formats.
Automates the setup and management of isolated, reproducible test environments using Docker Compose and Testcontainers.
Generates mocks, stubs, spies, and fakes automatically to streamline unit testing and dependency isolation across various testing frameworks.
Generates mocks, stubs, and spies for unit testing by automatically analyzing code dependencies and framework requirements.
Generates realistic, schema-compliant synthetic data sets for software testing, database seeding, and performance analysis.
Generates realistic, schema-compliant test data including user profiles, product catalogs, and transactional records for software testing and development.
Streamlines SOC2 compliance by automating evidence gathering, identifying security control gaps, and generating readiness reports.
Simplifies SOC2 audit preparation by automating evidence collection, identifying compliance gaps, and generating readiness reports.
Executes automated verification suites to ensure application health and core functionality after deployments or configuration changes.
Identifies session management vulnerabilities and security flaws within your codebase to ensure robust user authentication and protection.
Audits and analyzes codebase session management to identify vulnerabilities like session fixation and improper expiration policies.
Automates comprehensive security vulnerability testing and penetration scans to identify OWASP Top 10 flaws and injection risks.
Automates security vulnerability testing for applications and APIs to identify OWASP Top 10 risks and critical software flaws.
Identifies and remediates security vulnerabilities in infrastructure-as-code, application configurations, and system settings.
Identifies and remediates potential security vulnerabilities in infrastructure-as-code, application configurations, and system settings.
Provides structured guidance and specialized playbooks for managing, investigating, and remediating cybersecurity breaches and attacks.
Automates the secure integration and configuration of secrets management tools like HashiCorp Vault and AWS Secrets Manager into your infrastructure.
Tracks and automates regression testing suites to ensure code stability and prevent unintended regressions during development.
Scroll for more results...