security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Identifies unauthorized credential usage by analyzing NTLM authentication patterns and correlating them with credential dumping activities.
Implements granular USB device control policies across endpoints to prevent data exfiltration and mitigate malware risks from unauthorized removable media.
Detects and analyzes heap spray attacks in memory dumps by identifying NOP sled patterns and suspicious memory allocations using Volatility3.
Identifies and tests for OAuth 2.0 and OpenID Connect vulnerabilities including redirect URI manipulation and token leakage.
Tests and identifies critical injection vulnerabilities in APIs, covering SQL, NoSQL, SSRF, and command injection vectors.
Performs deep packet inspection and forensic analysis of network traffic to identify security threats, data exfiltration, and malicious communications.
Streamlines the systematic process of identifying, testing, and deploying software updates to remediate vulnerabilities across IT infrastructure.
Detects and analyzes anomalous network connections to identify potential command-and-control activity and data exfiltration.
Implements comprehensive external attack surface management to discover, fingerprint, and score the risk of internet-facing assets.
Performs deep-inspection security assessments using system credentials to identify patches, configurations, and hidden vulnerabilities.
Performs automated GraphQL schema extraction and vulnerability assessments to secure API endpoints against common attack vectors.
Detects and analyzes ransomware activity within network logs by identifying C2 beaconing, TOR connections, and data exfiltration patterns.
Monitors and detects unauthorized container escape attempts in real-time using Falco runtime security rules and syscall analysis.
Secures serverless compute platforms by implementing least-privilege IAM roles, secrets management, dependency scanning, and runtime monitoring.
Automates the deployment and management of AWS Config rules to ensure continuous resource compliance with CIS and PCI DSS frameworks.
Secures your AI development environment by performing automated supply chain security scans on Claude Code skills before installation.
Analyzes and reports test coverage for Go projects to identify testing gaps and ensure software reliability.
Secures Temporal clusters using mTLS, role-based access control (RBAC), and network isolation policies.
Provides standardized implementation patterns and guidance for testing Temporal workflows, activities, and Nexus operations using the Go SDK.
Secures Temporal clusters through mTLS, role-based access control, and network policy implementations.
Standardizes the testing process for BayesFlow extensions by implementing best practices for Keras backends, shape verification, and simulation mocks.
Enforces a strict Red-Green-Refactor workflow to ensure all production code is verified by failing tests before implementation.
Enforces evidence-based reporting by requiring fresh command execution and output validation before any task is marked as complete.
Enforces a strict Red-Green-Refactor cycle to ensure code reliability and eliminate technical debt through test-first implementation.
Implements a rigorous, four-phase debugging framework to identify root causes and prevent regressions before applying code fixes.
Implements a rigorous, four-phase methodology to identify root causes and eliminate software bugs without trial-and-error thrashing.
Enforces a strict evidence-based protocol for verifying code changes and task completion before making success claims.
Secures Clerk authentication implementations by enforcing best practices for environment variables, middleware, and webhook verification.
Automates the creation, maintenance, and execution of comprehensive end-to-end testing suites to ensure robust web application performance.
Enforces strict data isolation by ensuring every MongoDB query and service method includes a verified tenant identifier.
Scroll for more results...