Pentest Checklist

🌐Community
by jpropato · vlatest · Repository

This Pentest Checklist by jpropato provides a structured guide for comprehensive security testing, ensuring thoroughness and reducing missed vulnerabilities.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add jpropato-pentest-checklist npx -- -y @trustedskills/jpropato-pentest-checklist
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "jpropato-pentest-checklist": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/jpropato-pentest-checklist"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill provides a comprehensive pentesting checklist to guide security assessments. It helps ensure thoroughness by systematically covering common attack vectors and vulnerabilities. The checklist is designed to be adaptable for various environments and can assist in identifying potential weaknesses in systems and applications.

When to use it

  • Performing initial security assessments: Use the checklist as a starting point when evaluating the security posture of a new system or application.
  • Preparing for audits: Ensure all necessary security checks are performed before an external audit.
  • Training junior pentesters: Provide a structured guide for less experienced team members to follow during penetration testing engagements.
  • Documenting pentest procedures: Maintain consistency and traceability by using the checklist as a standard operating procedure.

Key capabilities

  • Provides a detailed, step-by-step pentesting process.
  • Covers common attack vectors and vulnerability types.
  • Offers a structured approach to security assessments.
  • Adaptable for various environments.

Example prompts

  • "Generate the pentest checklist."
  • "What are the reconnaissance steps in the pentest checklist?"
  • "Give me the post-exploitation phase of the pentest checklist."

Tips & gotchas

The skill assumes a basic understanding of penetration testing concepts. While adaptable, tailoring the checklist to specific environments may require some manual adjustments and additions.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
jpropato
Installs
8

🌐 Community

Passed automated security scans.