security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Automates the discovery of software vulnerabilities using coverage-guided fuzzing patterns and security best practices.
Identifies error-prone API designs and dangerous configuration patterns to prevent security vulnerabilities and misuse.
Ensures codebase reliability through real-time truth scoring, automated code verification, and an intelligent rollback system.
Identifies recurring security vulnerabilities and bugs across codebases using advanced pattern-based analysis.
Verifies that blockchain protocol implementations strictly adhere to their technical specifications and whitepapers during security audits.
Enforces maximal security isolation for Signal authentication using nested VM and container boundaries with colored operad constraints.
Manages encrypted secrets using age encryption and DuckDB-based catalogs within a triadic GF(3) framework.
Analyzes academic drafts and documentation to identify patterns typical of AI-generated text and ensures an authentic, human-authored writing style.
Configures automated visual testing workflows to detect UI inconsistencies and regressions across multiple browsers and devices.
Identifies and overcomes common fuzzing bottlenecks to improve software security testing coverage and bug discovery.
Leverages gestalt principles to analyze, manipulate, and defend emergent perceptual patterns within complex data streams and cybernetic loops.
Performs comprehensive audits of modified code to identify security vulnerabilities, performance bottlenecks, and violations of project-specific coding standards.
Implements a disciplined four-phase debugging process to identify root causes and ensure stable, verified code fixes.
Performs sophisticated structural code searches and architectural analysis using Abstract Syntax Tree patterns.
Validates architectural scalability and identifies hidden edge cases by stress-testing system assumptions at extreme scales.
Validates Cloudflare Workers security patterns in real-time to prevent vulnerabilities and enforce serverless best practices.
Validates authentication and session management configurations against OWASP security standards to prevent common vulnerabilities.
Identifies and remediates security vulnerabilities across application code, dependencies, and infrastructure using systematic assessment methodologies.
Implements a secure, distributed object capability system for autopoietic actor-based communication and peer-to-peer networking.
Implements a rigorous test-driven development workflow with spec traceability and multi-tier testing patterns.
Automates regulatory compliance auditing and security control monitoring for SOC2, HIPAA, GDPR, and PCI-DSS standards.
Provides expert smart contract development advice and security reviews based on Trail of Bits' industry-standard best practices.
Validates and sanitizes intent-centric architectures to ensure safety and well-formedness before execution.
Manages secure provisioning, certificate installation, and network onboarding for TizenRT and ARTIK IoT devices.
Monitors and reports man-in-the-middle (MITM) mentions and patterns across local repositories and history files.
Secures sensitive credentials using the hardware-backed macOS Keychain with mathematically balanced GF(3) lifecycles.
Simplifies the creation of high-quality automated tests by providing battle-tested patterns and templates for unit, integration, and end-to-end testing.
Implements a disciplined Test-Driven Development cycle for Ruby on Rails applications using a structured Red-Green-Refactor framework.
Generates comprehensive unit, integration, and E2E test suites automatically while learning from your project's specific testing style.
Verifies multi-layer cryptographic identity proofs and orchestrates complex quest fulfillment within the Plurigrid ASI ecosystem.
Scroll for more results...