agent security skill risk: medium
SSL/TLS Security Assessment with Sslyze
Provides steps to assess SSL/TLS server configurations using the sslyze Python library, including configuring scans, executing TLS checks, analyzing cipher suites and vulnerabiliti…
- Policy sensitive
- Human review
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
--- name: performing-ssl-tls-security-assessment description: "Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains," --- # Performing SSL/TLS Security Assessment ## Overview Assess SSL/TLS server configurations using sslyze, a fast Python-based scanning library. This skill covers evaluating supported protocol versions (SSLv2/3, TLS 1.0-1.3), cipher suite strength, certificate chain validation, HSTS enforcement, OCSP stapling, and scanning for known vulnerabilities including Heartbleed, ROBOT, and session renegotiation weaknesses. ## When to Use - When conducting security assessments that involve performing ssl tls security assessment - When following incident response procedures for related security events - When performing scheduled security testing or auditing activities - When validating security controls through hands-on testing ## Prerequisites - Python 3.9+ with `sslyze` library (pip install sslyze) - Network access to target HTTPS servers on port 443 - Understanding of TLS protocol versions and cipher suite classifications ## Steps ### Step 1: Configure Server Scan Create ServerScanRequest with ServerNetworkLocation specifying target hostname and port. ### Step 2: Execute TLS Scan Use sslyze Scanner to queue and execute scans for all TLS check commands concurrently. ### Step 3: Analyze Results Evaluate accepted cipher suites, certificate validity, protocol versions, and vulnerability scan results. ### Step 4: Generate Security Report Produce a JSON report with compliance findings and remediation recommendations. ## Expected Output JSON report with supported protocols, accepted cipher suites, certificate details, vulnerability results (Heartbleed, ROBOT), and HSTS status.
REQUIRED CONTEXT
- target hostname and port
TOOLS REQUIRED
- sslyze
EXPECTED OUTPUT
- Format
- structured_report
- Schema
- json_schema · supported protocols, accepted cipher suites, certificate details, vulnerability results (Heartbleed, ROBOT), HSTS status
- Constraints
- JSON format
- include supported protocols, cipher suites, certificate details, vulnerabilities, HSTS status
SUCCESS CRITERIA
- Evaluate accepted cipher suites, certificate validity, protocol versions, and vulnerability scan results
- Produce a JSON report with compliance findings and remediation recommendations
CAVEATS
- Dependencies
- Python 3.9+ with `sslyze` library
- Network access to target HTTPS servers on port 443
- Missing context
- Exact JSON schema or structure for the report
- Code examples or command snippets for each step
- Ambiguities
- The description field is truncated at 'certificate chains,'
QUALITY
- OVERALL
- 0.68
- CLARITY
- 0.75
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.70
- COMPLETENESS
- 0.65
IMPROVEMENT SUGGESTIONS
- Complete the truncated sentence in the description field.
- Expand each step with concrete code or API usage examples.
- Define the precise keys and format expected in the JSON report.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity
- Security Audit Fix Commit Revieweragentsecurity