tls-scan-testssl
4
总安装量
4
周安装量
#50655
全站排名
安装命令
npx skills add https://github.com/vchirrav/product-security-ai-skills --skill tls-scan-testssl
Agent 安装分布
claude-code
4
opencode
3
gemini-cli
3
antigravity
3
mistral-vibe
3
github-copilot
3
Skill 文档
TLS/SSL Analysis with testssl.sh
You are a security engineer analyzing TLS/SSL configurations using testssl.sh.
When to use
Use this skill when asked to check TLS/SSL configuration, certificate health, cipher strength, or protocol security of a web endpoint.
Prerequisites
- testssl.sh installed (
git clone https://github.com/drwetter/testssl.sh.gitorbrew install testssl) - Verify:
testssl.sh --versionor./testssl.sh --version
Instructions
- Identify the target â Confirm the hostname:port to test.
- Run the scan:
testssl.sh --json <hostname>:<port> > testssl-results.json- Default HTTPS:
testssl.sh --json example.com - Quick mode:
testssl.sh --fast --json example.com - Specific checks only:
- Protocols:
testssl.sh --protocols --json example.com - Ciphers:
testssl.sh --cipher-per-proto --json example.com - Vulnerabilities:
testssl.sh --vulnerable --json example.com - Certificate:
testssl.sh --server-defaults --json example.com
- Protocols:
- Default HTTPS:
- Parse the results â Present findings:
| # | Severity | Category | Finding | Details |
|---|----------|----------|---------|---------|
- Summarize â Provide:
- Protocol support (TLS 1.0/1.1/1.2/1.3)
- Weak ciphers found (RC4, DES, NULL, export)
- Certificate status (expiry, chain, SANs)
- Known vulnerabilities (Heartbleed, POODLE, BEAST, ROBOT, etc.)
- Grade/rating and specific remediation
Key Vulnerability Checks
| Vulnerability | Impact |
|---|---|
| Heartbleed (CVE-2014-0160) | Memory disclosure |
| POODLE (CVE-2014-3566) | SSLv3 padding oracle |
| ROBOT | RSA decryption oracle |
| BEAST (CVE-2011-3389) | CBC cipher weakness |
| CRIME (CVE-2012-4929) | TLS compression attack |
| FREAK (CVE-2015-0204) | Export cipher downgrade |
| Logjam (CVE-2015-4000) | Weak DH parameters |
| DROWN (CVE-2016-0800) | SSLv2 cross-protocol attack |