cloud-penetration-testing
Perform Cloud Security Assessment
Security professionals need comprehensive cloud penetration testing capabilities across Azure, AWS, and GCP environments. This skill provides structured workflows for reconnaissance, enumeration, exploitation, and persistence testing with clear authorization requirements.
Download the skill ZIP
Upload in Claude
Go to Settings → Capabilities → Skills → Upload skill
Toggle on and start using
Test it
Using "cloud-penetration-testing". Enumerate AWS S3 buckets and check for public access
Expected outcome:
Returns list of S3 buckets with access controls, identifies publicly accessible buckets, provides remediation recommendations for misconfigurations
Using "cloud-penetration-testing". Check Azure AD for users with password in attributes
Expected outcome:
Returns Azure AD users with sensitive data in attributes, shows which properties contain potential secrets
Using "cloud-penetration-testing". Access GCP metadata service for credential discovery
Expected outcome:
Returns GCP service account tokens and metadata from compromised compute instance
Security Audit
Low RiskThis skill contains cloud penetration testing commands and scripts commonly used in authorized security assessments. Static analysis flagged external command execution, network access, and metadata endpoint patterns - all standard elements of legitimate cloud security testing. The skill includes clear authorization requirements and is designed for security professionals. Findings are false positives in this context as they represent standard pen testing techniques for Azure, AWS, and GCP.
High Risk Issues (4)
Medium Risk Issues (2)
Low Risk Issues (1)
Risk Factors
⚙️ External commands (114)
🌐 Network access (50)
📁 Filesystem access (5)
Detected Patterns
Quality Score
What You Can Build
Security Consultant Conducting AWS Assessment
Perform comprehensive AWS security assessment including S3 bucket enumeration, IAM role analysis, and EC2 instance testing
Blue Team Member Testing Defenses
Validate organization's cloud security controls by simulating attacker techniques
DevSecOps Engineer Hardening Cloud Infrastructure
Identify and remediate cloud misconfigurations before attackers can exploit them
Try These Prompts
Use the cloud-penetration-testing skill to enumerate AWS resources. List all S3 buckets, EC2 instances, and IAM users accessible with current credentials. Run: aws sts get-caller-identity first to check authentication.
Use the cloud-penetration-testing skill to enumerate Azure AD users and groups. List all users, groups, and role assignments. Check for users with password in attributes.
Use the cloud-penetration-testing skill to assess GCP security. List enabled services, compute instances, storage buckets, and IAM policies. Check for overly permissive service accounts.
Use the cloud-penetration-testing skill to perform a comprehensive multi-cloud security assessment covering AWS, Azure, and GCP. Document all findings with remediation recommendations.
Best Practices
- Always obtain written authorization before testing any cloud environment
- Document all testing activities and findings for compliance
- Use read-only enumeration techniques first before attempting exploitation
- Respect scope boundaries and do not access systems outside authorization
Avoid
- Running penetration tests without proper authorization
- Testing production systems without notification to operations team
- Attempting to access customer data in multi-tenant environments
- Ignoring detection and alerting mechanisms during testing
Frequently Asked Questions
Does this skill work with multi-factor authentication?
Can this skill bypass cloud security controls?
Is password spraying included?
Does this skill work offline?
Can I use this for internal security testing?
What cloud providers are supported?
Developer Details
Author
sickn33License
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/cloud-penetration-testingRef
main
File structure