Testing & Security
Testing frameworks, security tools, and best practices
9063 skills in this category
auditing-wallet-security
Audit crypto wallet security including private key management and transaction signing.Use when auditing wallet security practices.Trigger with phrases like "audit wallet", "check security", or "verify signatures".
scanning-accessibility
Validate WCAG compliance and accessibility standards (ARIA, keyboard navigation).Use when auditing WCAG compliance or screen reader compatibility.Trigger with phrases like "scan accessibility", "check WCAG compliance", or "validate screen readers".
detecting-sql-injection-vulnerabilities
Detect and analyze SQL injection vulnerabilities in application code and database queries.Use when you need to scan code for SQL injection risks, review query construction, validate input sanitization, or implement secure query patterns.Trigger with phrases like "detect SQL injection", "scan for SQLi vulnerabilities", "review database queries", or "check SQL security".
assisting-with-soc2-audit-preparation
Automate SOC 2 audit preparation including evidence gathering, control assessment, and compliance gap identification.Use when you need to prepare for SOC 2 audits, assess Trust Service Criteria compliance, document security controls, or generate readiness reports.Trigger with phrases like "SOC 2 audit preparation", "SOC 2 readiness assessment", "collect SOC 2 evidence", or "Trust Service Criteria compliance".
implementing-database-audit-logging
Use when you need to track database changes for compliance and security monitoring.This skill implements audit logging using triggers, application-level logging, CDC, or native logs.Trigger with phrases like "implement database audit logging", "add audit trails","track database changes", or "monitor database activity for compliance".
running-chaos-tests
Execute chaos engineering experiments to test system resilience.Use when performing specialized testing.Trigger with phrases like "run chaos tests", "test resilience", or "inject failures".
checking-owasp-compliance
Check compliance with OWASP Top 10 security risks and best practices. Use when performing comprehensive security audits. Trigger with 'check OWASP compliance', 'audit web security', or 'validate OWASP'.
performing-security-testing
Automate security vulnerability testing covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication issues.Use when performing security assessments, penetration tests, or vulnerability scans.Trigger with phrases like "scan for vulnerabilities", "test security", or "run penetration test".
validating-csrf-protection
Validate CSRF protection implementations for security gaps. Use when reviewing form security or state-changing operations. Trigger with 'validate CSRF', 'check CSRF protection', or 'review token security'.
validating-cors-policies
Validate CORS policies for security issues and misconfigurations. Use when reviewing cross-origin resource sharing. Trigger with 'validate CORS', 'check CORS policy', or 'review cross-origin'.
monitoring-cross-chain-bridges
Monitor cross-chain bridge security, liquidity, and transaction status across networks.Use when monitoring cross-chain asset transfers.Trigger with phrases like "monitor bridges", "check cross-chain", or "track bridge transfers".
000-jeremy-content-consistency-validator
Validate messaging consistency across website, GitHub repos, and local documentation generating read-only discrepancy reports. Use when checking content alignment or finding mixed messaging. Trigger with phrases like "check consistency", "validate documentation", or "audit messaging".
analyzing-dependencies
Check dependencies for known security vulnerabilities and outdated versions. Use when auditing third-party libraries. Trigger with 'check dependencies', 'scan for vulnerabilities', or 'audit packages'.
checking-session-security
Analyze session management implementations to identify security vulnerabilities in web applications.Use when you need to audit session handling, check for session fixation risks, review session timeout configurations, or validate session ID generation security.Trigger with phrases like "check session security", "audit session management", "review session handling", or "session fixation vulnerability".
validating-authentication-implementations
Validate authentication mechanisms for security weaknesses and compliance. Use when reviewing login systems or auth flows. Trigger with 'validate authentication', 'check auth security', or 'review login'.
generating-test-doubles
Generate mocks, stubs, spies, and fakes for dependency isolation.Use when creating mocks, stubs, or test isolation fixtures.Trigger with phrases like "generate mocks", "create test doubles", or "setup stubs".
running-smoke-tests
Execute fast smoke tests validating critical functionality after deployment.Use when performing specialized testing.Trigger with phrases like "run smoke tests", "quick validation", or "test critical paths".
automating-database-backups
Use when you need to automate database backup processes with scheduling and encryption.This skill creates backup scripts for PostgreSQL, MySQL, MongoDB, and SQLite with compression.Trigger with phrases like "automate database backups", "schedule database dumps","create backup scripts", or "implement disaster recovery for database".
testing-mobile-apps
Execute mobile app testing on iOS and Android devices/simulators.Use when performing specialized testing.Trigger with phrases like "test mobile app", "run iOS tests", or "validate Android functionality".
testing-visual-regression
Detect visual changes in UI components using screenshot comparison.Use when detecting unintended UI changes or pixel differences.Trigger with phrases like "test visual changes", "compare screenshots", or "detect UI regressions".