Performs authorized security scanning using static, dynamic, and vulnerability-focused methods. Use when mapping exposed services, profiling application behavior, and identifying known weaknesses for validation.
87
80%
Does it follow best practices?
Impact
100%
1.36xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/pt-scanning/SKILL.mdRun scans only against approved in-scope targets and within agreed timing/rate constraints. If scan aggressiveness is unknown, default to conservative settings and ask.
# Scanning Output
## Scan Coverage
- Target groups:
- Methods used:
- Time window:
## Findings (Prioritized)
- Finding:
- Affected asset:
- Evidence:
- Confidence:
- Exploitability notes:
- Recommended validation:
## False Positive Queue
- Candidate:
- Why uncertain:
- Verification step:
## Handoff to Gaining Access
- High-priority validated candidates:
- Preconditions:a8ff73a
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.