Search Skills
Search across 54932 indexed skills
python-testing
This skill provides comprehensive Python testing patterns using pytest as the primary testing framework. Use pytest as the testing framework for its p...
vue-testing-best-practices
Vue.js testing best practices, patterns, and common gotchas. Setting up test infrastructure for Vue 3 projects → See testing-vitest-recommended-for-vu...
perl-testing
Comprehensive testing strategies for Perl applications using Test2::V0, Test::More, prove, and TDD methodology. Writing new Perl code (follow TDD: red...
cpp-testing
Agent-focused testing workflow for modern C++ (C++17/20) using GoogleTest/GoogleMock with CMake/CTest. Writing new C++ tests or fixing existing tests ...
kotlin-testing
Comprehensive Kotlin testing patterns for writing reliable, maintainable tests following TDD methodology with Kotest and MockK. Writing new Kotlin fun...
rust-testing
Comprehensive Rust testing patterns for writing reliable, maintainable tests following TDD methodology. Writing new Rust functions, methods, or traits...
csharp-testing
Comprehensive testing patterns for .NET applications using xUnit, FluentAssertions, and modern testing practices. Writing new tests for C# code Review...
vue-testing-best-practices-hyf0
Vue.js testing best practices, patterns, and common gotchas. Setting up test infrastructure for Vue 3 projects → See testing-vitest-recommended-for-vu...
webapp-testing
To test local web applications, write native Python Playwright scripts. Helper Scripts Available: scripts/withserver.py - Manages server lifecycle (su...
python-testing-patterns
Comprehensive guide to implementing robust testing strategies in Python using pytest, fixtures, mocking, parameterization, and test-driven development...
vue-testing-best-practices
Vue.js testing best practices, patterns, and common gotchas. Setting up test infrastructure for Vue 3 projects → See testing-vitest-recommended-for-vu...
ssrf-testing
SSRF(Server-Side Request Forgery)是一种利用服务器发起请求的漏洞,可以访问内网资源、进行端口扫描或绕过防火墙。本技能提供SSRF漏洞的检测、利用和防护方法。 应用程序接受URL参数并请求该URL,攻击者可以控制请求的目标,导致: 内网资源访问 本地文件读取 端口扫描 ...