Performs authorized security assessment of embedded and IoT devices across hardware, firmware, interfaces, and update mechanisms. Use when testing device boot flows, debug interfaces, firmware integrity, and local/network attack surfaces.
91
86%
Does it follow best practices?
Impact
99%
1.12xAverage score across 3 eval scenarios
Passed
No known issues
Assessment report structure and quality checks
Device Context section
0%
100%
Device Context fields
100%
100%
Interface Findings section
40%
100%
Interface Findings fields
25%
100%
Firmware and Boot Findings section
60%
100%
Firmware and Boot Findings fields
25%
100%
Remediation Plan section
100%
100%
Remediation Plan fields
50%
100%
Fleet vs single-device risk
100%
100%
Lifecycle recommendations
100%
100%
Safety and recovery documented
66%
100%
Constrained exploitability
83%
100%
Test environment definition and interface enumeration
Authorization confirmation
100%
100%
Safe handling and recovery plan
100%
100%
Device model and firmware version
100%
100%
Accessories and network topology
100%
100%
Spare hardware and fail-safe boundaries
100%
100%
Physical debug interfaces (UART/JTAG/SWD)
100%
100%
Wireless interface enumeration
100%
100%
Network services enumeration
100%
100%
Companion app enumeration
100%
100%
Boot modes documented
70%
100%
Maintenance/debug channels
100%
100%
Firmware trust and runtime security assessment
Secure boot assessment
100%
100%
Signature checks assessed
100%
100%
Rollback protection assessed
100%
100%
Key handling assessed
100%
100%
Service hardening (local)
100%
100%
Service hardening (remote)
100%
100%
Credential storage assessed
100%
88%
Update mechanism assessed
100%
100%
Telemetry exposure assessed
100%
100%
Firmware extraction authorization noted
100%
100%
Fleet vs single-device risk
100%
100%
a8ff73a
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.