Back to tags
Tag

Agent Skills with tag: security-testing

6 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

security-testing-patterns

Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.

security-testingSASTDASTpenetration-testing
NickCrew
NickCrew
52

security-testing-verification

Test security features and verify implementation before deployment. Use this skill when you need to test CSRF protection, rate limiting, input validation, verify security headers, run security audits, or check the pre-deployment security checklist. Triggers include "test security", "security testing", "verify security", "security checklist", "pre-deployment", "test CSRF", "test rate limit", "security verification".

security-testingcsrfrate-limitingsecurity-headers
harperaa
harperaa
1

security-prompts

Library of battle-tested security prompt templates for secure feature implementation. Use when implementing forms, endpoints, authentication, authorization, file uploads, or conducting security reviews. Triggers include "security prompt", "secure form", "RBAC", "threat model", "STRIDE", "admin endpoint", "file upload", "security testing", "code review", "OWASP".

security-testingOWASPRBACfile-upload
harperaa
harperaa
1

security

Production-grade security testing skill with OWASP Top 10, vulnerability scanning, penetration testing guidance, and compliance validation

OWASPvulnerability-scanningpenetration-testingcompliance-validation
pluginagentmarketplace
pluginagentmarketplace
1

Broken Authentication Testing

This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session management security", "perform credential stuffing tests", "evaluate password policies", "test for session fixation", or "identify authentication bypass flaws". It provides comprehensive techniques for identifying authentication and session management weaknesses in web applications.

authentication-testingsession-managementcredential-stuffingsecurity-testing
zebbern
zebbern
0

Pentest Checklist

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.

penetration-testingsecurity-assessmentchecklistsecurity-testing
zebbern
zebbern
0