CtrlK
BlogDocsLog inGet started
Tessl Logo

pt-embedded-device-assessment

Performs authorized security assessment of embedded and IoT devices across hardware, firmware, interfaces, and update mechanisms. Use when testing device boot flows, debug interfaces, firmware integrity, and local/network attack surfaces.

91

1.12x
Quality

86%

Does it follow best practices?

Impact

99%

1.12x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

Evaluation results

100%

32%

Security Assessment Report: Industrial Smart Sensor Platform

Assessment report structure and quality checks

Criteria
Without context
With context

Device Context section

0%

100%

Device Context fields

100%

100%

Interface Findings section

40%

100%

Interface Findings fields

25%

100%

Firmware and Boot Findings section

60%

100%

Firmware and Boot Findings fields

25%

100%

Remediation Plan section

100%

100%

Remediation Plan fields

50%

100%

Fleet vs single-device risk

100%

100%

Lifecycle recommendations

100%

100%

Safety and recovery documented

66%

100%

Constrained exploitability

83%

100%

100%

3%

Pre-Assessment Planning: Connected Patient Monitoring Gateway

Test environment definition and interface enumeration

Criteria
Without context
With context

Authorization confirmation

100%

100%

Safe handling and recovery plan

100%

100%

Device model and firmware version

100%

100%

Accessories and network topology

100%

100%

Spare hardware and fail-safe boundaries

100%

100%

Physical debug interfaces (UART/JTAG/SWD)

100%

100%

Wireless interface enumeration

100%

100%

Network services enumeration

100%

100%

Companion app enumeration

100%

100%

Boot modes documented

70%

100%

Maintenance/debug channels

100%

100%

99%

-1%

Firmware and Runtime Security Findings: Home Gateway Device

Firmware trust and runtime security assessment

Criteria
Without context
With context

Secure boot assessment

100%

100%

Signature checks assessed

100%

100%

Rollback protection assessed

100%

100%

Key handling assessed

100%

100%

Service hardening (local)

100%

100%

Service hardening (remote)

100%

100%

Credential storage assessed

100%

88%

Update mechanism assessed

100%

100%

Telemetry exposure assessed

100%

100%

Firmware extraction authorization noted

100%

100%

Fleet vs single-device risk

100%

100%

Repository
santosomar/ethical-hacking-agent-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.