CtrlK
BlogDocsLog inGet started
Tessl Logo

pt-scanning

Performs authorized security scanning using static, dynamic, and vulnerability-focused methods. Use when mapping exposed services, profiling application behavior, and identifying known weaknesses for validation.

87

1.36x
Quality

80%

Does it follow best practices?

Impact

100%

1.36x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/pt-scanning/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

100%

41%

Documenting Scan Results for a Small Business Network Assessment

Output template and finding documentation

Criteria
Without context
With context

Scan Coverage section

50%

100%

Findings section present

100%

100%

Evidence per finding

70%

100%

Confidence per finding

30%

100%

Exploitability notes per finding

62%

100%

Recommended validation per finding

100%

100%

False Positive Queue section

12%

100%

FP why uncertain field

12%

100%

FP verification step field

12%

100%

Handoff section present

62%

100%

Handoff high-priority candidates

100%

100%

Coverage gaps documented

100%

100%

100%

4%

Planning the Scanning Phase for a Retail Company Penetration Test

Scan planning and asset segmentation

Criteria
Without context
With context

Asset class segmentation

100%

100%

Rate limits specified

100%

100%

Conservative defaults

100%

100%

Scope constraints addressed

100%

100%

Service enumeration step

100%

100%

Vulnerability scanning focus

100%

100%

Application scanning step

100%

100%

Triage step included

100%

100%

Coverage gap documentation

60%

100%

No unrestricted aggressiveness

100%

100%

100%

36%

Triaging Raw Scanner Output for a Healthcare Provider Assessment

Triage deduplication and prioritization

Criteria
Without context
With context

Duplicates removed

100%

100%

False Positive Queue section

0%

100%

FP why uncertain

0%

100%

FP verification step

0%

100%

Exploitability-based ranking

100%

100%

Business impact in ranking

100%

100%

Evidence per finding

50%

100%

Confidence per finding

100%

100%

Handoff section

80%

100%

No severity-only ordering

100%

100%

Repository
santosomar/ethical-hacking-agent-skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.