发现security & testing类别的 Claude 技能。浏览 105 个技能,找到适合您 AI 工作流程的完美功能。
Analyzes code changes for security vulnerabilities using LLM-powered reasoning and STRIDE threat modeling patterns.
Verifies mathematical formulas and expressions using Behavior-Driven Development workflows and automated LaTeX extraction.
Facilitates interaction, integration, and security auditing for the Ostium Protocol perpetual exchange on Arbitrum.
Formalizes and verifies complex mathematical theorems across music theory, color harmony, and distributed systems using Lean 4.
Audits Algorand smart contracts for security vulnerabilities including rekeying attacks and access control issues.
Bridges ElizaOS and OpenClaw plugins to the Goblins Object Capability Network to enforce high-security structural authority.
Validates security patches and fixes to ensure they completely resolve vulnerabilities without introducing new regressions.
Implements features and fixes bugs using the disciplined Red-Green-Refactor cycle of Test-Driven Development (TDD).
Validates AI-generated code and agent outputs using real-time truth scoring and automated rollback systems to maintain high codebase reliability.
Analyzes DWARF debug files and provides deep technical insight into DWARF standards for binary analysis and low-level debugging.
Verifies Claude Code skill activation and keyword trigger functionality using a simple diagnostic word.
Performs language-specific security reviews and provides actionable improvements for Python, JavaScript, and Go projects.
Verifies that source code accurately implements technical specifications and whitepapers to ensure protocol integrity during blockchain audits.
Scans Tizen application dependencies and kernel files for known security vulnerabilities and CVEs using official Samsung and OpenCVE databases.
Conducts structured adversarial reviews to challenge assumptions and identify hidden vulnerabilities in plans or architectures.
Validates intent-centric architectures by ensuring requests are well-formed, authorized, and resource-balanced before execution.
Implements secure authentication and authorization patterns using modern industry standards.
Automates the setup and management of Docker-based integration tests for Go applications using pre-configured modules and best practices.
Compiles gathered facts and validated hypotheses into structured binary analysis reports and actionable intelligence.
Configures and installs a complete suite of binary reverse engineering and cross-architecture analysis tools.
Identifies architecture, ABI, and potential capabilities of unknown binary files and firmware blobs using fast fingerprinting techniques.
Analyzes binaries, executables, and bytecode using a structured methodology to uncover functionality and internal logic.
Analyzes binary execution and runtime behavior through emulation, debugging, and syscall tracing.
Performs deep static analysis on binary files to map structure, decompile code, and identify logic without execution.
Implements triadic balanced governance and staking on the Aptos blockchain using GF(3) conservation principles.
Performs semantic diffing and triadic verification on Model Context Protocol (MCP) specifications to detect breaking changes and validate compliance.
Gates agent actions using ε-machine causal state inference to ensure verified skill coverage before task execution.
Evaluates and scores multiple code implementations using a standardized five-criteria framework to identify optimal software solutions.
Manages macOS Mobile Device Management (MDM) and authentication states using topological cobordism and triadic logic.
Prevents agent actions by verifying minimal skill coverage using ε-machine causal state modeling.
Scroll for more results...