Cloud Penetration Testing
Simulates cloud penetration tests, identifying vulnerabilities in AWS, Azure, and GCP configurations via automated scans.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add hainamchung-cloud-penetration-testing npx -- -y @trustedskills/hainamchung-cloud-penetration-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"hainamchung-cloud-penetration-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/hainamchung-cloud-penetration-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill allows AI agents to perform cloud penetration testing. It can identify vulnerabilities in cloud environments, assess security posture, and provide recommendations for remediation. The tool simulates real-world attack scenarios to uncover weaknesses that could be exploited by malicious actors.
When to use it
- Pre-deployment Security Checks: Before launching a new application or service on the cloud, use this skill to proactively identify and fix vulnerabilities.
- Periodic Security Audits: Regularly assess your existing cloud infrastructure for emerging threats and misconfigurations.
- Compliance Requirements: Demonstrate adherence to security standards (e.g., SOC 2, PCI DSS) by simulating penetration testing activities.
- Incident Response Preparation: Test incident response plans by simulating attacks on cloud resources.
Key capabilities
- Vulnerability Scanning
- Security Posture Assessment
- Attack Simulation
- Remediation Recommendations
Example prompts
- "Simulate a brute-force attack against our AWS S3 buckets."
- "Perform a security audit of our Azure Kubernetes Service (AKS) cluster."
- "Identify potential vulnerabilities in our Google Cloud Platform (GCP) firewall rules."
Tips & gotchas
This skill requires appropriate permissions and access to the target cloud environment. Ensure you have proper authorization before initiating any penetration testing activities, as unauthorized scanning can be illegal or violate service terms.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.