This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP security", "enumerate cloud resources", "exploit cloud misconfiguratio...
Install with Tessl CLI
npx tessl i github:sickn33/antigravity-awesome-skills --skill cloud-penetration-testing84
Quality
68%
Does it follow best practices?
Impact
96%
1.20xAverage score across 6 eval scenarios
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/cloud-penetration-testing/SKILL.mdAWS multi-region enumeration scripts
regions.txt file
100%
100%
Region list completeness
100%
100%
while-read iteration
100%
100%
EC2 public IP discovery
100%
100%
ELBv2 load balancer coverage
100%
100%
Classic ELB coverage
100%
100%
RDS endpoint discovery
100%
100%
CloudFormation outputs
100%
100%
In-place deduplication
100%
100%
jq -r plain-text output
0%
100%
Append mode
100%
100%
Without context: $0.4921 · 2m 26s · 28 turns · 34 in / 6,835 out tokens
With context: $0.7231 · 2m 14s · 30 turns · 5,292 in / 6,547 out tokens
ScoutSuite output parsing
tail -n +2 prefix skip
80%
100%
Multi-directory iteration
100%
100%
Lambda env variable extraction
100%
100%
S3 world-listable finding
100%
100%
Account ID alongside S3 findings
100%
100%
EC2 user data extraction
100%
100%
Unencrypted EBS volumes
100%
100%
Unencrypted EBS snapshots
0%
0%
Separate output files
100%
100%
Append mode across accounts
60%
100%
Without context: $0.4485 · 2m 23s · 24 turns · 31 in / 7,142 out tokens
With context: $1.3513 · 5m 11s · 43 turns · 5,199 in / 15,909 out tokens
Assessment planning and deliverables
Cloud Security Assessment Report deliverable
75%
100%
Resource Inventory deliverable
0%
100%
Credential Findings deliverable
0%
100%
Remediation Recommendations deliverable
87%
100%
ScoutSuite listed
100%
100%
Pacu listed
100%
100%
Azure AD tooling
100%
100%
Detection systems mentioned
100%
100%
Slow enumeration guidance
62%
100%
Written authorization requirement
100%
100%
Scope and rules of engagement
100%
100%
cloud_enum or ip2provider mentioned
100%
100%
Without context: $0.5804 · 3m 41s · 25 turns · 32 in / 9,785 out tokens
With context: $0.8827 · 4m 48s · 24 turns · 5,366 in / 13,149 out tokens
GCP enumeration and exploitation workflow
Service account key auth
100%
100%
Organization/project enumeration
0%
100%
IAM policy enumeration
100%
100%
Enabled services listing
0%
100%
Source repository enumeration
0%
100%
Compute instance enumeration
100%
100%
Storage enumeration with gsutil
100%
100%
SQL instance enumeration
100%
100%
Kubernetes cluster credentials
100%
100%
Metadata-Flavor header
100%
100%
Metadata service URL
100%
100%
Cloud Functions analysis
62%
100%
KMS decrypt command
0%
0%
Access scopes check
100%
100%
Without context: $0.4109 · 2m 43s · 13 turns · 20 in / 9,769 out tokens
With context: $0.7091 · 3m 35s · 22 turns · 5,361 in / 10,750 out tokens
Azure Automation runbook and Function App enumeration
Get-AzSubscription iteration
100%
100%
Select-AzSubscription per iteration
100%
100%
Per-subscription output directory
25%
100%
Get-AzAutomationAccount usage
100%
100%
Get-AzAutomationRunbook usage
100%
100%
Export-AzAutomationRunbook
75%
100%
Get-AzFunctionApp usage
0%
100%
ApplicationSettings extraction
33%
100%
SiteConfig or config extraction
100%
100%
IdentityUserAssignedIdentity extraction
12%
100%
Automation job output collection
0%
100%
Without context: $0.4038 · 2m 33s · 11 turns · 16 in / 9,482 out tokens
With context: $0.5769 · 2m 41s · 18 turns · 320 in / 8,065 out tokens
AWS IMDSv2, Lambda secrets, and RDS snapshot exposure
IMDSv2 PUT token request
100%
100%
IMDSv2 TTL header
100%
100%
TOKEN variable usage
100%
100%
IMDSv2 token auth on metadata request
100%
100%
IAM credentials metadata path
100%
100%
Lambda list-functions
100%
100%
Lambda get-function with jq env extraction
50%
66%
RDS snapshot-type manual filter
100%
100%
RDS describe-db-snapshot-attributes
100%
100%
AttributeValues all check
100%
100%
IMDSv1 not sole method
100%
100%
Without context: $0.2523 · 1m 42s · 12 turns · 15 in / 5,287 out tokens
With context: $0.5363 · 2m 24s · 16 turns · 5,358 in / 7,584 out tokens
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.