Use when: "security", "penetration test", "pentest", "vulnerability", "OWASP", "network", "firewall", "SSL", "TLS", "DNS", "load balancer", "CDN", "encryption", "authentication", "authorization", "secrets".
View on GitHubboshu2/agentops
domain-kit
January 24, 2026
Select agents to install to:
npx add-skill https://github.com/boshu2/agentops/blob/main/plugins/domain-kit/skills/security/SKILL.md -a claude-code --skill securityInstallation paths:
.claude/skills/security/# Security Skill Security testing and network infrastructure patterns. ## Quick Reference | Area | Key Patterns | When to Use | |------|--------------|-------------| | **Penetration Testing** | Vulnerability assessment, exploitation | Security audits | | **Network Engineering** | Load balancers, DNS, SSL/TLS, CDN | Infrastructure | --- ## Penetration Testing ### Assessment Methodology | Phase | Activities | |-------|------------| | **Reconnaissance** | Information gathering, footprinting | | **Scanning** | Port scanning, vulnerability scanning | | **Exploitation** | Attempting to exploit vulnerabilities | | **Post-Exploitation** | Privilege escalation, lateral movement | | **Reporting** | Documenting findings and recommendations | ### OWASP Top 10 Testing | Vulnerability | Test Method | |---------------|-------------| | **Injection** | SQLi, command injection payloads | | **Broken Auth** | Session testing, credential stuffing | | **Sensitive Data** | HTTPS checks, data exposure | | **XXE** | XML entity injection | | **Access Control** | IDOR, privilege escalation | | **Misconfig** | Default creds, unnecessary services | | **XSS** | Script injection, DOM manipulation | | **Deserialization** | Object injection | | **Components** | CVE scanning | | **Logging** | Log injection, audit trail | ### Common Tools ```bash # Network scanning nmap -sV -sC -oA scan target.com # Web vulnerability scanning nikto -h https://target.com nuclei -u https://target.com # SSL/TLS testing testssl.sh target.com:443 # Directory enumeration gobuster dir -u https://target.com -w wordlist.txt ``` ### Security Assessment Report Template ```markdown # Security Assessment Report **Target**: [System/Application] **Date**: [Date] **Assessor**: [Name] ## Executive Summary [High-level findings and risk summary] ## Findings ### Critical | ID | Finding | CVSS | Affected | |----|---------|------|----------| | C-01 | SQL Injection | 9.8 | /api/users | ### High | ID | Finding | CVSS |