Performs authorized security scanning using static, dynamic, and vulnerability-focused methods. Use when mapping exposed services, profiling application behavior, and identifying known weaknesses for validation.
87
80%
Does it follow best practices?
Impact
100%
1.36xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/pt-scanning/SKILL.mdOutput template and finding documentation
Scan Coverage section
50%
100%
Findings section present
100%
100%
Evidence per finding
70%
100%
Confidence per finding
30%
100%
Exploitability notes per finding
62%
100%
Recommended validation per finding
100%
100%
False Positive Queue section
12%
100%
FP why uncertain field
12%
100%
FP verification step field
12%
100%
Handoff section present
62%
100%
Handoff high-priority candidates
100%
100%
Coverage gaps documented
100%
100%
Scan planning and asset segmentation
Asset class segmentation
100%
100%
Rate limits specified
100%
100%
Conservative defaults
100%
100%
Scope constraints addressed
100%
100%
Service enumeration step
100%
100%
Vulnerability scanning focus
100%
100%
Application scanning step
100%
100%
Triage step included
100%
100%
Coverage gap documentation
60%
100%
No unrestricted aggressiveness
100%
100%
Triage deduplication and prioritization
Duplicates removed
100%
100%
False Positive Queue section
0%
100%
FP why uncertain
0%
100%
FP verification step
0%
100%
Exploitability-based ranking
100%
100%
Business impact in ranking
100%
100%
Evidence per finding
50%
100%
Confidence per finding
100%
100%
Handoff section
80%
100%
No severity-only ordering
100%
100%
a8ff73a
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.