发现security & testing类别的 Claude 技能。浏览 105 个技能,找到适合您 AI 工作流程的完美功能。
Analyzes DWARF debug files and provides deep technical insight into DWARF standards for binary analysis and low-level debugging.
Analyzes smart contract token implementations and integrations for security vulnerabilities and compliance with industry standards.
Performs language-specific security reviews and provides actionable improvements for Python, JavaScript, and Go projects.
Parses and explores Burp Suite project files from the command line to streamline security audits and traffic analysis.
Manages sensitive credentials using the hardware-backed macOS Keychain with mathematically balanced GF(3) operations.
Manages encrypted secrets using age encryption and mathematical GF(3) triadic conservation for secure, git-safe configuration.
Generates comprehensive STRIDE-based security threat models by analyzing repository architecture and data flows.
Secures Move smart contracts through comprehensive fuzzing, property testing, and vulnerability detection for Aptos, Sui, and Movement blockchains.
Validates intent-centric architectures by ensuring requests are well-formed, authorized, and resource-balanced before execution.
Implements features and fixes bugs using the disciplined Red-Green-Refactor cycle of Test-Driven Development (TDD).
Provides standardized patterns and best practices for writing comprehensive tests for Effect-TS applications and services.
Manages macOS Mobile Device Management (MDM) and authentication states using topological cobordism and triadic logic.
Master advanced debugging techniques and root cause analysis to efficiently identify and resolve complex software bugs across any technology stack.
Conducts structured adversarial reviews to challenge assumptions and identify hidden vulnerabilities in plans or architectures.
Performs deep, line-by-line code analysis to establish architectural context for security audits and bug detection.
Performs deep binary analysis, decompilation, and malware research using industry-standard tools like Ghidra, IDA Pro, and radare2.
Gates agent actions using ε-machine causal state inference to ensure verified skill coverage before task execution.
Implements secure authentication and authorization patterns using modern industry standards.
Performs semantic diffing and triadic verification on Model Context Protocol (MCP) specifications to detect breaking changes and validate compliance.
Prevents agent actions by verifying minimal skill coverage using ε-machine causal state modeling.
Enhances security testing effectiveness by identifying and overcoming technical barriers that prevent fuzzers from reaching deep code paths.
Generates mechanically verified cryptographic proofs and audit trails for event-sourced systems to ensure consistency, security, and deterministic replay.
Orchestrates the Tizen certification lifecycle by coordinating TCT test execution, compliance verification, and documentation.
Verifies that source code accurately implements technical specifications and whitepapers to ensure protocol integrity during blockchain audits.
Verifies cryptographic implementations for timing side-channel vulnerabilities to ensure data-independent, constant-time execution.
Analyzes git history to map security ownership, calculate bus factor for sensitive code, and identify orphaned repository hotspots.
Performs advanced digital forensics and malware analysis to detect targeted surveillance and device compromise.
Automates the setup and management of Docker-based integration tests for Go applications using pre-configured modules and best practices.
Implements protocol-aligned value extraction and transaction fee mechanisms based on Stanford FDCI research.
Automates security audits for Solana smart contracts by identifying critical vulnerabilities including arbitrary CPI and improper PDA validation.
Scroll for more results...