security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Implements robust end-to-end testing suites using Playwright, Page Object Models, and CI/CD integration best practices.
Enforces a mandatory evidence-based verification workflow before any task is marked as complete or successful.
Conducts automated multi-stage code reviews and security audits with parallel sub-agents and gated test verification.
Secures Kubernetes deployments by validating Helm chart integrity and scanning templates for security misconfigurations.
Enforces rigorous, evidence-based verification protocols before any task is marked as complete or committed to a repository.
Enforces a strict Red-Green-Refactor workflow to ensure all production code is verified by failing automated tests before implementation.
Enforces a rigorous, four-phase methodology to identify root causes and implement reliable fixes for software defects.
Identifies and tests GraphQL API denial-of-service vulnerabilities through recursive nesting and query complexity analysis.
Enforces a strict Red-Green-Refactor cycle to ensure code reliability and high-quality software design.
Secures Docker environments by implementing CIS Benchmark standards and industry-leading container hardening practices.
Triages web application vulnerability findings from DAST and SAST scanners using the OWASP Risk Rating Methodology to prioritize remediation efforts.
Automates the deployment and management of MISP to aggregate, correlate, and distribute threat intelligence feeds across security infrastructures.
Implements Google's BeyondCorp zero trust security model to replace traditional VPNs with identity-aware, context-based access controls.
Automates data privacy, GDPR compliance, and retention policies for Gamma integrations.
Configures role-based access control, SSO integration, and credit-based budget management for Ideogram AI image generation.
Audits web application HTTP response headers to identify missing or misconfigured security protections like CSP, HSTS, and Secure cookies.
Optimizes fuzzer performance by providing domain-specific tokens to guide parsers and protocol handlers toward deeper code paths.
Implements secure role-based access control and API key management for enterprise Deepgram integrations.
Configures multi-layer Cloudflare security controls to protect web infrastructure from volumetric, protocol, and application-layer DDoS attacks.
Validates cryptographic implementations against a comprehensive library of known attack vectors and edge cases.
Optimizes Retell AI integrations through automated load testing, Kubernetes auto-scaling configurations, and data-driven capacity planning.
Monitors and analyzes Certificate Transparency logs to detect phishing attempts, unauthorized SSL/TLS issuances, and potential brand impersonation.
Automates data export, retention policies, and GDPR/CCPA compliance for Granola meeting transcripts and notes.
Facilitates authorized initial access testing using the EvilGinx3 adversary-in-the-middle framework to bypass multi-factor authentication.
Secures organizational email domains by configuring SPF, DKIM, and DMARC protocols to prevent spoofing and phishing.
Generates high-quality fuzzing harnesses to identify edge-case bugs and security vulnerabilities across multiple programming languages.
Extract embedded configurations and exfiltration credentials from Agent Tesla RAT samples using .NET decompilation and automated string analysis.
Identifies and tracks adversary movement across network environments using specialized Splunk SPL queries and Windows event analysis.
Deploys honeypots, honeytokens, and decoy systems to provide high-fidelity detection of lateral movement and credential abuse.
Implements security guardrails and resource policy enforcement for applications hosted on Replit to prevent data leaks and resource overages.
Scroll for more results...