Skip to main content
NEW · APP STORE Now on iOS · macOS · iPad Android & Windows soon GET IT
Prompts SSL/TLS Security Assessment with Sslyze

agent security skill risk: medium

SSL/TLS Security Assessment with Sslyze

Provides steps to assess SSL/TLS server configurations using the sslyze Python library, including configuring scans, executing TLS checks, analyzing cipher suites and vulnerabiliti…

  • Policy sensitive
  • Human review
  • External action: medium

SKILL 4 files · 2 folders

SKILL.md
---
name: performing-ssl-tls-security-assessment
description: "Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains,"
---
# Performing SSL/TLS Security Assessment

## Overview

Assess SSL/TLS server configurations using sslyze, a fast Python-based scanning library. This skill covers evaluating supported protocol versions (SSLv2/3, TLS 1.0-1.3), cipher suite strength, certificate chain validation, HSTS enforcement, OCSP stapling, and scanning for known vulnerabilities including Heartbleed, ROBOT, and session renegotiation weaknesses.


## When to Use

- When conducting security assessments that involve performing ssl tls security assessment
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing

## Prerequisites

- Python 3.9+ with `sslyze` library (pip install sslyze)
- Network access to target HTTPS servers on port 443
- Understanding of TLS protocol versions and cipher suite classifications

## Steps

### Step 1: Configure Server Scan
Create ServerScanRequest with ServerNetworkLocation specifying target hostname and port.

### Step 2: Execute TLS Scan
Use sslyze Scanner to queue and execute scans for all TLS check commands concurrently.

### Step 3: Analyze Results
Evaluate accepted cipher suites, certificate validity, protocol versions, and vulnerability scan results.

### Step 4: Generate Security Report
Produce a JSON report with compliance findings and remediation recommendations.

## Expected Output

JSON report with supported protocols, accepted cipher suites, certificate details, vulnerability results (Heartbleed, ROBOT), and HSTS status.

REQUIRED CONTEXT

  • target hostname and port

TOOLS REQUIRED

  • sslyze

EXPECTED OUTPUT

Format
structured_report
Schema
json_schema · supported protocols, accepted cipher suites, certificate details, vulnerability results (Heartbleed, ROBOT), HSTS status
Constraints
  • JSON format
  • include supported protocols, cipher suites, certificate details, vulnerabilities, HSTS status

SUCCESS CRITERIA

  • Evaluate accepted cipher suites, certificate validity, protocol versions, and vulnerability scan results
  • Produce a JSON report with compliance findings and remediation recommendations

CAVEATS

Dependencies
  • Python 3.9+ with `sslyze` library
  • Network access to target HTTPS servers on port 443
Missing context
  • Exact JSON schema or structure for the report
  • Code examples or command snippets for each step
Ambiguities
  • The description field is truncated at 'certificate chains,'

QUALITY

OVERALL
0.68
CLARITY
0.75
SPECIFICITY
0.55
REUSABILITY
0.70
COMPLETENESS
0.65

IMPROVEMENT SUGGESTIONS

  • Complete the truncated sentence in the description field.
  • Expand each step with concrete code or API usage examples.
  • Define the precise keys and format expected in the JSON report.

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR AGENT