Pentest Checklist
This Pentest Checklist by jpropato provides a structured guide for comprehensive security testing, ensuring thoroughness and reducing missed vulnerabilities.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add jpropato-pentest-checklist npx -- -y @trustedskills/jpropato-pentest-checklist
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"jpropato-pentest-checklist": {
"command": "npx",
"args": [
"-y",
"@trustedskills/jpropato-pentest-checklist"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill provides a comprehensive pentesting checklist to guide security assessments. It helps ensure thoroughness by systematically covering common attack vectors and vulnerabilities. The checklist is designed to be adaptable for various environments and can assist in identifying potential weaknesses in systems and applications.
When to use it
- Performing initial security assessments: Use the checklist as a starting point when evaluating the security posture of a new system or application.
- Preparing for audits: Ensure all necessary security checks are performed before an external audit.
- Training junior pentesters: Provide a structured guide for less experienced team members to follow during penetration testing engagements.
- Documenting pentest procedures: Maintain consistency and traceability by using the checklist as a standard operating procedure.
Key capabilities
- Provides a detailed, step-by-step pentesting process.
- Covers common attack vectors and vulnerability types.
- Offers a structured approach to security assessments.
- Adaptable for various environments.
Example prompts
- "Generate the pentest checklist."
- "What are the reconnaissance steps in the pentest checklist?"
- "Give me the post-exploitation phase of the pentest checklist."
Tips & gotchas
The skill assumes a basic understanding of penetration testing concepts. While adaptable, tailoring the checklist to specific environments may require some manual adjustments and additions.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.