credential-testerReference tool for devtools — covers intro, quickstart, patterns and more. Quick lookup for Credential Tester concepts, best practices, and implementation pa...
Install via ClawdBot CLI:
clawdbot install bytesagain3/credential-testerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://bytesagain.comAudited Apr 16, 2026 · audit v1.0
Generated Mar 21, 2026
IT teams use this skill to audit employee access credentials during security reviews. They test HTTP portals, SSH server access, and FTP file transfers to ensure only authorized personnel have valid credentials. This helps identify compromised accounts before they're exploited.
Security consultants employ this skill during penetration tests to validate discovered credentials against target systems. They test HTTP login pages, SSH connections, and FTP servers to confirm access levels. This provides evidence of vulnerability for client reports.
DevOps teams use this skill when rotating service account credentials across infrastructure. They test new HTTP API tokens, SSH keys for server access, and FTP credentials for file transfers before deploying changes. This prevents service disruptions during credential updates.
Compliance officers use this skill to verify that authentication systems meet regulatory requirements. They test HTTP authentication mechanisms, SSH access controls, and FTP security protocols against standards like PCI DSS or HIPAA. This provides documented evidence for audits.
Security operations centers use this skill during security incidents to test potentially compromised credentials. They quickly validate HTTP session tokens, SSH keys, and FTP passwords across systems to determine breach scope. This helps contain credential-based attacks faster.
Integrate this skill into a cloud-based security testing platform offered as subscription service. Customers pay monthly for automated credential validation across their infrastructure. Revenue comes from tiered subscriptions based on number of tests and integrations.
Include this skill in managed security service packages where technicians perform regular credential testing for clients. Offer scheduled testing, reporting, and remediation as part of comprehensive security management. Revenue comes from monthly retainer contracts.
License this skill to security tool vendors for integration into their existing products. Vulnerability scanners, SIEM systems, and identity management platforms can embed credential testing capabilities. Revenue comes from licensing fees and revenue sharing agreements.
💬 Integration Tip
Set up environment variables for frequently tested endpoints to streamline repetitive testing. Use the check-env command first to verify all dependencies are properly configured.
Scored Apr 19, 2026
Guide for creating effective skills. This skill should be used when users want to create a new skill (or update an existing skill) that extends Claude's capabilities with specialized knowledge, workflows, or tool integrations.
Systematic code review patterns covering security, performance, maintainability, correctness, and testing — with severity levels, structured feedback guidance, review process, and anti-patterns to avoid. Use when reviewing PRs, establishing review standards, or improving review quality.
Coding style memory that adapts to your preferences, conventions, and patterns for consistent coding.
Provides a 7-step debugging protocol plus language-specific commands to systematically identify, verify, and fix software bugs across multiple environments.
Control and operate Opencode via slash commands. Use this skill to manage sessions, select models, switch agents (plan/build), and coordinate coding through Opencode.
Use when starting any conversation - establishes how to find and use skills, requiring Skill tool invocation before ANY response including clarifying questions