security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Scans source code to identify and mitigate vulnerabilities that could lead to service disruptions or resource exhaustion.
Calculates business-weighted risk scores and generates prioritized remediation roadmaps for the PASTA threat modeling framework.
Analyzes application workflows and business rules to identify logic-based security vulnerabilities that automated scanners often miss.
Provides instant definitions and framework mappings for application security terms and vulnerability classes.
Analyzes implementation plans and architecture designs to identify security vulnerabilities before a single line of code is written.
Traces application data from input sources to storage sinks to identify security vulnerabilities and trust boundary violations.
Identifies and remediates hardcoded credentials, API keys, and sensitive tokens across source code and git history.
Analyzes source code for detectability threats and timing side channels to prevent unauthorized inference of system interactions.
Audits source code for SQL, NoSQL, and command injection vulnerabilities to align with OWASP Top 10 security standards.
Analyzes source code for privacy regulation violations including GDPR, CCPA, and HIPAA non-compliance.
Simulates realistic exploit chains and scores vulnerability exploitability using the PASTA threat modeling framework.
Analyzes source code and data structures to detect PII exposure and re-identification risks in anonymized datasets.
Identifies authorization vulnerabilities and privilege escalation paths within your source code using the STRIDE threat modeling framework.
Simplifies the integration of Better Auth into TypeScript applications with optimized configurations and security-first implementation patterns.
Performs comprehensive security and safety assessments of agent skills and MCP servers to identify prompt injection risks, malicious code, and data exfiltration attempts.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Identifies and audits source code for privacy threats related to undisclosed data collection, missing consent mechanisms, and transparency gaps.
Systematically traces bugs backward through the call stack to identify and fix the original trigger rather than the symptom.
Automates browser testing and UI verification for local web applications using Playwright and managed server lifecycles.
Lints and tests bash scripts using ShellCheck and BATS to ensure production-grade shell code and reliable automation.
Implements a rigorous four-phase framework to identify root causes and ensure permanent fixes before modifying code.
Protects your system by validating AI-generated shell commands and blocking dangerous operations before execution.
Protects your system by intercepting and validating AI-generated shell commands before execution to prevent data loss and security breaches.
Protects systems by validating AI-generated shell commands and file operations against a comprehensive safety protocol before execution.
Protects your system from dangerous AI-generated shell commands and hallucinations through real-time safety validation.
Streamlines API testing workflows using modern tools like Bruno, Postman, and contract testing frameworks to ensure backend reliability.
Analyzes source code to identify and mitigate linkability threats where user data can be correlated across services, sessions, or contexts.
Audits source code to identify and mitigate unauthorized personal data (PII) exposure in logs, APIs, and third-party integrations.
Verifies documentation procedures by converting them into executable Doc Detective test specifications and validating them automatically.
Prevents the reintroduction of security vulnerabilities by verifying historical fixes against current code changes.
Scroll for more results...