发现security & testing类别的 Claude 技能。浏览 105 个技能,找到适合您 AI 工作流程的完美功能。
Provides an extensive library of offensive security techniques and defensive patterns in Go for advanced red teaming and agentic simulations.
Orchestrates comprehensive testing across architectural layers with coverage-first analysis and isolated worktrees.
Identifies seven critical security vulnerabilities in Substrate and Polkadot pallets during the development and auditing process.
Performs rigorous security audits and bug detection on local code changes using a structured multi-phase review process.
Configures robust authentication for Next.js applications using NextAuth.js v5, OAuth providers, and Prisma database persistence.
Scans codebases for placeholders, TODOs, and stubs to generate structured remediation plans for technical debt.
Detects memory leaks, buffer overflows, and coding vulnerabilities in Tizen C/C++ and JavaScript applications using specialized static analysis.
Streamlines codebase security review preparation using the industry-standard Trail of Bits checklist to ensure audit readiness.
Performs granular, line-by-line code analysis to establish deep architectural context for security audits and bug hunting.
Discovers vulnerabilities and edge-case bugs in Python code using Atheris coverage-guided fuzzing.
Implements Ruby on Rails features and bug fixes using a disciplined Test-Driven Development (TDD) workflow.
Implements on-chain triadic coordination and GF(3)-balanced governance using Aptos Move smart contracts.
Scans Solana and Anchor programs for critical security vulnerabilities to ensure smart contract integrity.
Generates complete, production-ready React features using a strict Test-Driven Development workflow and feature-based architecture.
Audits Algorand smart contracts to detect critical security vulnerabilities and logic flaws in TEAL or PyTeal code.
Performs comprehensive binary and source code fuzzing using the AFL++ framework to identify software vulnerabilities.
Streamlines smart contract validation using Hardhat and Foundry to ensure secure, gas-efficient, and production-ready blockchain code.
Audits SMACK policy files for label conflicts, correctness, and mandatory access control compliance in Tizen environments.
Generates idiomatic, table-driven Go tests following a Test-Driven Development workflow to ensure robust behavior and boundary handling.
Enforces mandatory human oversight for security-sensitive, complex, or high-volume code changes within the development lifecycle.
Automates UI testing for the Ark Dashboard using Playwright and manages screenshot attachments for GitHub Pull Requests.
Enforces a strict evidence-first workflow by requiring fresh command output and verification before any task is marked as complete.
Generates comprehensive unit, integration, and E2E test suites automatically while learning from your project's specific testing style.
Enhances security testing performance by building specialized dictionaries of magic values and syntax tokens for coverage-guided fuzzers.
Maps security requirements to implementation and coordinates compliance against international standards for Tizen and IoT applications.
Guides the Red-Green-Refactor cycle to ensure high-quality, verified code through test-first development.
Analyzes token implementations and integrations for security vulnerabilities, ERC compliance, and non-standard behavioral patterns using Trail of Bits expertise.
Develops high-performance fuzzing harnesses to identify security vulnerabilities and edge-case crashes in software codebases.
Identifies known vulnerabilities in Tizen application dependencies and kernel versions using the OpenCVE database and Samsung security updates.
Implements advanced fuzzing campaigns using the LibAFL framework to identify software vulnerabilities and memory safety issues.
Scroll for more results...