Generate Python project scaffolding with Poetry/pipenv, pytest configuration, type hints (mypy), linting...
cat ~/最新
浏览最新添加到市场的技能
Generate Java project scaffolding with Maven/Gradle, JUnit 5, Mockito, Checkstyle/SpotBugs, and packaging...
Generate C# .NET project scaffolding with dotnet CLI, xUnit/NUnit, StyleCop analyzers, and packaging (NuGet/Docker).
Coverage configuration and thresholds
Phased rollout timeline with effort estimates
How to execute the test with prerequisites and validation steps
Consumer-driven contract test specifications (Pact, Spring Cloud Contract)
Design chaos engineering experiments to test system resilience with controlled failure injection, hypothesis...
Usage examples and documentation
Grafana/CloudWatch dashboard configuration for SLO tracking
Evaluate zero-trust architecture maturity using CISA ZTMM with identity verification, device trust,...
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and...
Validate software supply chain security with SBOM generation, dependency scanning, provenance verification, and SLSA...
Verify operating system hardening using CIS benchmarks with patch management, kernel hardening, and host-based...
Validate network security architecture with firewall rule analysis, segmentation verification, and defense-in-depth...
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and...
Validate cryptographic implementations using NIST standards with TLS configuration, cipher suite analysis, and...
Validate container and Kubernetes security using CIS benchmarks with pod security standards, RBAC review, and image...
Evaluate cloud security posture across AWS, Azure, and GCP with storage exposure checks, IAM policy review, and...
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero...
Validate application security using OWASP Top 10 2021 and API Security Top 10 guidelines with injection prevention...
Integrate secrets management (Vault, AWS, Azure, GCP) with rotation policies, access controls, and Kubernetes/CI/CD...
Review Rust code for memory safety, concurrency patterns, performance optimization, and ecosystem tooling (cargo,...
Generate incident response playbooks for security incidents, outages, and disaster recovery with NIST SP 800-61...