security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Automates security vulnerability assessments and penetration testing for web applications and APIs using industry-standard patterns.
Conducts automated security audits and vulnerability assessments to identify OWASP Top 10 threats in web applications.
Automates the design, execution, and analysis of performance tests to identify system bottlenecks and optimize application throughput.
Automates the design, execution, and analysis of comprehensive performance tests to identify system bottlenecks and optimize scalability.
Tracks, executes, and analyzes regression test suites to ensure code stability and prevent functionality breaks.
Automates the identification, execution, and analysis of regression test suites to ensure code stability during development.
Identifies and remediates exposed API keys, passwords, and sensitive credentials within your codebase using advanced pattern matching and entropy analysis.
Identifies and remediates exposed secrets, API keys, and credentials within codebases using pattern matching and entropy analysis.
Automates the integration of enterprise-grade secrets managers like HashiCorp Vault and AWS Secrets Manager into your infrastructure and application code.
Conducts comprehensive security audits of codebases to identify vulnerabilities like SQL injection, XSS, and insecure dependencies.
Performs comprehensive security audits to identify code vulnerabilities and provide detailed remediation guidance.
Generates comprehensive security audit reports and vulnerability assessments to improve system security posture and compliance.
Generates comprehensive security audit reports and vulnerability assessments to improve system posture and ensure regulatory compliance.
Analyzes HTTP security headers to identify vulnerabilities and provide actionable recommendations for website hardening.
Analyzes HTTP security headers to identify vulnerabilities and provides actionable recommendations for improving website security posture.
Guides users through the complete security incident response lifecycle, from initial threat classification to remediation and post-incident reporting.
Guides teams through the security incident response lifecycle by automating classification, playbook generation, and remediation planning.
Identifies potential security vulnerabilities and compliance issues within infrastructure-as-code and application configuration files.
Identifies and remediates security vulnerabilities in infrastructure-as-code and application configuration files.
Conducts comprehensive security audits, vulnerability assessments, and compliance reviews for code and infrastructure.
Performs comprehensive security audits and compliance checks for codebases, infrastructure configurations, and cryptographic implementations.
Automates security vulnerability scans and penetration testing to identify OWASP Top 10 flaws, injection vulnerabilities, and authentication issues.
Automates security vulnerability scanning and penetration testing for applications and APIs to identify OWASP Top 10 flaws.
Analyzes codebase session management to identify vulnerabilities and ensure compliance with security best practices.
Analyzes session management implementations to identify security vulnerabilities and ensure compliance with best practices.
Executes automated smoke tests to verify critical application functionality and system health instantly.
Executes critical smoke test suites to verify application health, authentication, and core functionality instantly.
Manages and updates snapshot tests across major JavaScript frameworks using intelligent diff analysis to distinguish intentional changes from regressions.
Streamlines SOC2 audit preparation by automating evidence gathering, security control analysis, and compliance gap reporting.
Automates SOC2 evidence gathering and compliance gap analysis to streamline the audit preparation process.
Scroll for more results...