Pentest Checklist
Generates a comprehensive pentest checklist to ensure thorough security assessments and identify vulnerabilities effectively.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add sebas-aikon-intelligence-pentest-checklist npx -- -y @trustedskills/sebas-aikon-intelligence-pentest-checklist
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"sebas-aikon-intelligence-pentest-checklist": {
"command": "npx",
"args": [
"-y",
"@trustedskills/sebas-aikon-intelligence-pentest-checklist"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill provides a comprehensive penetration testing checklist to guide security assessments. It outlines key areas of focus, including reconnaissance, scanning, exploitation, and post-exploitation phases. The checklist aims to ensure thoroughness and identify potential vulnerabilities in target systems or networks.
When to use it
- Planning a pentest: Use the checklist as a framework for defining scope and objectives.
- Conducting vulnerability assessments: Employ the list to systematically evaluate security controls.
- Reviewing existing pentest reports: Compare findings against the checklist to identify any gaps or missed areas.
- Training junior pentesters: Serve as a guide for new team members learning penetration testing methodologies.
Key capabilities
- Comprehensive checklist covering multiple phases of penetration testing.
- Structured approach to security assessments.
- Guidance on key areas within each phase (reconnaissance, scanning, exploitation, post-exploitation).
Example prompts
- "Generate a pentest checklist for assessing the security of a web application."
- "Give me a detailed breakdown of reconnaissance activities in a penetration test."
- "What are some common vulnerabilities to look for during the exploitation phase?"
Tips & gotchas
This skill assumes a basic understanding of penetration testing concepts. The checklist is intended as a guide and may need to be adapted based on specific engagement requirements.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.