autorenew

Updated: 2026-03-25

security-testing

Basic Information

Skill Name
security-testing
Author
naodeng
Use Scenario
Authentication, data protection, and abuse risks need verification.
Target Users
Security-minded QAs and teams validating sensitive flows.
Summary
Who should use: Security-minded QAs and teams validating sensitive flows. Best used when: Authentication, data protection, and abuse risks need verification. How to use: Map attack surface, test high-risk vectors, and provide risk-ranked findings with retest criteria.

Full Skill Guide

When

  • Sensitive data, auth, or transaction flows are introduced/changed.
  • Compliance or internal policy requires security validation.
  • Potential abuse vectors are identified in design review.

What

  • Identify exploitable weaknesses in auth, input handling, and data protection.
  • Assess security risk impact and remediation priority.
  • Support secure-release decisions with evidence.

How

  1. Define threat scope and high-value assets.
  2. Build attack surface map across endpoints, roles, and trust boundaries.
  3. Execute checks for auth bypass, injection, data exposure, and misconfiguration.
  4. Validate logging, rate limits, and defensive controls.
  5. Reproduce vulnerabilities and estimate exploitability.
  6. Deliver risk-ranked findings with fix and revalidation guidance.

Reference

Positive Example (Input -> Output)

Input:

  • Feature: admin export API with role-based access

Output:

  • Found horizontal privilege escalation via parameter tampering
  • Risk: high (sensitive data exposure)
  • Fix: enforce server-side ownership check + add audit rule

Negative Example (Input -> Output)

Input:

  • "Do a security scan"

Output (problem):

  • Scanner results copied without exploit verification
  • False positives mixed with real risks

Limits

  • Do not treat scanner output as final verdict.
  • Do not test production attack scenarios without authorization.
  • Do not understate exploitability of data exposure issues.
  • Do not omit reproduction details for confirmed findings.
  • Do not sign off security status without remediation retest.

Usage Guide

  1. Install and enable security-testing first (use the install commands in this page).
  2. In your request, provide required context: scope, environment, timeline, and expected output format.
  3. Trigger with approved scope, for example: "Use security-testing for auth and sensitive-data APIs."
  4. Ask for outputs: threat checklist, test plan, finding severity rules, and evidence format.
  5. After remediation, request focused revalidation steps for each high-risk finding.

Installation

Platform

AI Tool

Quick install (one line)

Generating command...

Full script

Loading script...
Share