Testing & Security
Testing frameworks, security tools, and best practices
9063 skills in this category
checking-session-security
Analyze session management implementations to identify security vulnerabilities in web applications.Use when you need to audit session handling, check for session fixation risks, review session timeout configurations, or validate session ID generation security.Trigger with phrases like "check session security", "audit session management", "review session handling", or "session fixation vulnerability".
validating-authentication-implementations
Validate authentication mechanisms for security weaknesses and compliance. Use when reviewing login systems or auth flows. Trigger with 'validate authentication', 'check auth security', or 'review login'.
generating-test-doubles
Generate mocks, stubs, spies, and fakes for dependency isolation.Use when creating mocks, stubs, or test isolation fixtures.Trigger with phrases like "generate mocks", "create test doubles", or "setup stubs".
running-smoke-tests
Execute fast smoke tests validating critical functionality after deployment.Use when performing specialized testing.Trigger with phrases like "run smoke tests", "quick validation", or "test critical paths".
tracking-regression-tests
Track and manage regression test suites across releases.Use when performing specialized testing.Trigger with phrases like "track regressions", "manage regression suite", or "validate against baseline".
checking-infrastructure-compliance
Use when you need to work with compliance checking.This skill provides compliance monitoring and validation with comprehensive guidance and automation.Trigger with phrases like "check compliance", "validate policies",or "audit compliance".
generating-unit-tests
Automatically generate comprehensive unit tests from source code covering happy paths, edge cases, and error conditions.Use when creating test coverage for functions, classes, or modules.Trigger with phrases like "generate unit tests", "create tests for", or "add test coverage".
analyzing-security-headers
Analyze HTTP security headers of web domains to identify vulnerabilities and misconfigurations.Use when you need to audit website security headers, assess header compliance, or get security recommendations for web applications.Trigger with phrases like "analyze security headers", "check HTTP headers", "audit website security headers", or "evaluate CSP and HSTS configuration".
running-e2e-tests
Execute end-to-end tests covering full user workflows across frontend and backend.Use when performing specialized testing.Trigger with phrases like "run end-to-end tests", "test user flows", or "execute E2E suite".
generating-security-audit-reports
Generate comprehensive security audit reports for applications and systems.Use when you need to assess security posture, identify vulnerabilities, evaluate compliance status, or create formal security documentation.Trigger with phrases like "create security audit report", "generate security assessment", "audit security posture", or "PCI-DSS compliance report".
testing-load-balancers
Validate load balancer behavior, failover, and traffic distribution.Use when performing specialized testing.Trigger with phrases like "test load balancer", "validate failover", or "check traffic distribution".
managing-test-environments
Provision and manage isolated test environments with configuration and data.Use when performing specialized testing.Trigger with phrases like "manage test environment", "provision test env", or "setup test infrastructure".
generating-test-reports
Generate comprehensive test reports with metrics, coverage, and visualizations.Use when performing specialized testing.Trigger with phrases like "generate test report", "create test documentation", or "show test metrics".
fuzzing-apis
Perform API fuzzing to discover edge cases, crashes, and security vulnerabilities.Use when performing specialized testing.Trigger with phrases like "fuzz the API", "run fuzzing tests", or "discover edge cases".
performing-penetration-testing
Perform security penetration testing to identify vulnerabilities. Use when conducting security assessments. Trigger with 'run pentest', 'security testing', or 'find vulnerabilities'.
splitting-datasets
Split datasets into training, validation, and testing sets for ML model development. Use when requesting "split dataset", "train-test split", or "data partitioning".
vertex-engine-inspector
Execute inspect and validate Vertex AI Agent Engine deployments including Code Execution Sandbox, Memory Bank, A2A protocol compliance, and security posture. Generates production readiness scores. Use when asked to "inspect agent engine" or "validate depl... Trigger with relevant phrases based on skill purpose.
encrypting-and-decrypting-data
Validate encryption implementations and cryptographic practices. Use when reviewing data security measures. Trigger with 'check encryption', 'validate crypto', or 'review security keys'.
auditing-access-control
Audit access control implementations for security vulnerabilities and misconfigurations. Use when reviewing authentication and authorization. Trigger with 'audit access control', 'check permissions', or 'validate authorization'.
scanning-container-security
Use when you need to work with security and compliance.This skill provides security scanning and vulnerability detection with comprehensive guidance and automation.Trigger with phrases like "scan for vulnerabilities", "implement security controls",or "audit security".