Search Skills
Search across 54932 indexed skills
testing-api-security-with-owasp-top-10
During authorized API penetration testing engagements When assessing REST, GraphQL, or gRPC APIs for security vulnerabilities Before deploying new API...
testing-for-business-logic-vulnerabilities
During authorized penetration tests when automated scanners have found few technical vulnerabilities When assessing e-commerce platforms for pricing, ...
testing-jwt-token-security
During authorized penetration tests when the application uses JWT for authentication or authorization When assessing API security where JWTs are passe...
testing-cors-misconfiguration
During authorized penetration tests when assessing API endpoints for cross-origin access controls When testing single-page applications that make cros...
testing-oauth2-implementation-flaws
Assessing OAuth 2.0 authorization code flow for redirect URI validation weaknesses Testing OAuth client applications for CSRF protection (state parame...
testing-android-intents-for-vulnerabilities
Use this skill when: Assessing Android app exported activities, services, receivers, and content providers Testing for intent injection and unauthoriz...
testing-python
Every test should be atomic, self-contained, and test single functionality. A test that tests multiple things is harder to debug and maintain. Each te...
testing-patterns
Test-Driven Development (TDD): Write failing test FIRST Implement minimal code to pass Refactor after green Never write production code without a fail...
testing-strategy
Testing strategy answers: what failures would hurt users, what’s cheap to catch, and what signals we trust in CI. Coverage percentage alone is a weak ...
testing-patterns
Write tests that catch bugs, not tests that pass. — Confidence through coverage, speed through isolation. --- | Level | Ratio | Speed | Cost | Confide...
testing-workflow
Orchestrate comprehensive testing across a project by coordinating the testing-patterns skill, e2e-testing skill, and testing agents. This meta-skill ...
idor-testing
Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. This skil...