Pentest Checklist

🌐Community
by sickn33 · vlatest · Repository

This Pentest Checklist AI generates a comprehensive security audit plan to ensure thorough vulnerability testing and improve system protection.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add pentest-checklist npx -- -y @trustedskills/pentest-checklist
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "pentest-checklist": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/pentest-checklist"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

The pentest-checklist skill provides a structured framework for AI agents to generate comprehensive penetration testing checklists. It ensures security assessments cover critical phases from reconnaissance to reporting, reducing the risk of overlooked vulnerabilities.

When to use it

  • Pre-assessment planning: Generate a tailored scope and methodology before launching an automated scan or manual audit.
  • Compliance verification: Ensure your testing process aligns with industry standards like PTES, NIST, or OWASP.
  • Team coordination: Distribute a standardized checklist to junior pentesters to maintain consistency across engagements.
  • Gap analysis: Compare current security posture against the checklist items to identify missing controls.

Key capabilities

  • Generates phase-specific tasks for reconnaissance, scanning, exploitation, and post-exploitation.
  • Structures output into clear, actionable steps for human analysts or automation scripts.
  • Adapts checklists based on target environment types (web, network, mobile, cloud).

Example prompts

  • "Create a penetration testing checklist for a public-facing web application following the OWASP Top 10."
  • "Generate a pre-engagement scope document and asset discovery plan for a corporate intranet."
  • "List the key verification steps required after successfully exploiting a SQL injection vulnerability."

Tips & gotchas

Ensure you have explicit authorization before using generated checklists on any live system to avoid legal repercussions. Always customize the output to fit the specific technology stack and risk profile of the target environment.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
sickn33
Installs
61

🌐 Community

Passed automated security scans.