Cloud Penetration Testing
Simulates cloud environment penetration tests, identifying vulnerabilities and misconfigurations within zebbern's simulated infrastructure.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add zebbern-cloud-penetration-testing npx -- -y @trustedskills/zebbern-cloud-penetration-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"zebbern-cloud-penetration-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/zebbern-cloud-penetration-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to perform comprehensive cloud penetration testing, simulating real-world attacks to identify security vulnerabilities in cloud infrastructure. It automates the discovery of misconfigurations and weak points across various cloud service providers.
When to use it
- Conducting pre-deployment security audits for new cloud environments before going live.
- Validating the effectiveness of existing security controls after configuration changes.
- Preparing for compliance certifications that require proof of regular vulnerability scanning.
- Simulating advanced persistent threats (APTs) to test incident response readiness.
Key capabilities
- Automated scanning of cloud infrastructure for common misconfigurations.
- Identification of exposed storage buckets and unsecured API endpoints.
- Simulation of attack vectors specific to major cloud providers like AWS, Azure, and GCP.
- Generation of detailed reports highlighting critical security gaps and remediation steps.
Example prompts
- "Run a penetration test on our AWS S3 bucket configuration to find any public access issues."
- "Identify potential entry points in our Azure Kubernetes Service cluster setup."
- "Simulate an attack on our GCP load balancer rules to check for exposure vulnerabilities."
Tips & gotchas
Ensure you have explicit authorization from infrastructure owners before running penetration tests, as unauthorized scanning can violate cloud provider terms of service. Always scope the test to specific environments or accounts to avoid accidental disruption of production systems.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.