Pentest Checklist
This Pentest Checklist by davila7 generates a comprehensive security audit list to ensure thorough vulnerability assessments and improved system protection.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add davila7-pentest-checklist npx -- -y @trustedskills/davila7-pentest-checklist
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"davila7-pentest-checklist": {
"command": "npx",
"args": [
"-y",
"@trustedskills/davila7-pentest-checklist"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
The Pentest Checklist skill provides a structured framework for AI agents to systematically execute penetration testing engagements. It ensures comprehensive coverage of reconnaissance, scanning, exploitation, and reporting phases while maintaining adherence to ethical guidelines.
When to use it
- Pre-engagement planning: Define scope, rules of engagement, and objectives before starting any security assessment.
- Methodology guidance: Follow a standardized workflow for vulnerability discovery and validation during active testing.
- Reporting support: Generate detailed findings summaries with risk ratings and remediation recommendations post-assessment.
- Compliance verification: Ensure all testing activities align with legal boundaries and client-specific constraints.
Key capabilities
- Structured phase-based penetration testing workflow
- Reconnaissance and information gathering protocols
- Vulnerability scanning and exploitation guidance
- Risk assessment and reporting template generation
- Ethical hacking best practices integration
Example prompts
- "Generate a pre-engagement checklist for a web application pentest with defined scope boundaries."
- "Outline the reconnaissance phase steps for identifying entry points in a target network infrastructure."
- "Create a post-assessment report summary including vulnerability severity ratings and remediation priorities."
Tips & gotchas
Always obtain explicit written authorization before initiating any penetration testing activities. This skill supports methodology but does not replace human judgment in interpreting complex security contexts or handling unexpected system behaviors during live engagements.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.