home / skills / jeremylongshore / claude-code-plugins-plus-skills / https-certificate-checker

This skill guides secure https certificate checker setup with production-ready guidance, configurations, and validation aligned to security fundamentals.

npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill https-certificate-checker

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
2.3 KB
---
name: "https-certificate-checker"
description: |
  Validate https certificate checker operations. Auto-activating skill for Security Fundamentals.
  Triggers on: https certificate checker, https certificate checker
  Part of the Security Fundamentals skill category. Use when working with https certificate checker functionality. Trigger with phrases like "https certificate checker", "https checker", "https".
allowed-tools: "Read, Write, Grep, Bash(npm:*)"
version: 1.0.0
license: MIT
author: "Jeremy Longshore <[email protected]>"
---

# Https Certificate Checker

## Overview

This skill provides automated assistance for https certificate checker tasks within the Security Fundamentals domain.

## When to Use

This skill activates automatically when you:
- Mention "https certificate checker" in your request
- Ask about https certificate checker patterns or best practices
- Need help with essential security skills covering authentication, input validation, secure coding practices, and basic vulnerability detection.

## Instructions

1. Provides step-by-step guidance for https certificate checker
2. Follows industry best practices and patterns
3. Generates production-ready code and configurations
4. Validates outputs against common standards

## Examples

**Example: Basic Usage**
Request: "Help me with https certificate checker"
Result: Provides step-by-step guidance and generates appropriate configurations


## Prerequisites

- Relevant development environment configured
- Access to necessary tools and services
- Basic understanding of security fundamentals concepts


## Output

- Generated configurations and code
- Best practice recommendations
- Validation results


## Error Handling

| Error | Cause | Solution |
|-------|-------|----------|
| Configuration invalid | Missing required fields | Check documentation for required parameters |
| Tool not found | Dependency not installed | Install required tools per prerequisites |
| Permission denied | Insufficient access | Verify credentials and permissions |


## Resources

- Official documentation for related tools
- Best practices guides
- Community examples and tutorials

## Related Skills

Part of the **Security Fundamentals** skill category.
Tags: security, authentication, validation, owasp, secure-coding

Overview

This skill automates validation and checks for HTTPS certificates as part of Security Fundamentals. It provides practical, production-ready guidance, generates verification code and configurations, and reports issues found during certificate inspection. Use it to ensure TLS/HTTPS deployments meet common security standards and to debug certificate problems quickly.

How this skill works

The skill inspects certificate chains, validity periods, hostname matches, and common misconfigurations (expired certs, weak signatures, missing intermediate certificates). It can produce sample code or scripts to fetch and validate certificates, recommend configuration fixes, and run basic automated validations against common standards. Outputs include actionable remediation steps, configuration snippets, and validation results.

When to use it

  • You need to verify a server's TLS/HTTPS certificate chain and validity
  • Troubleshooting hostname mismatch, expired, or untrusted certificates
  • Generating code or scripts to automate certificate checks in CI/CD
  • Validating server configuration against best-practice TLS settings
  • Learning basic certificate validation concepts as part of security fundamentals

Best practices

  • Always validate the full certificate chain and check for trusted root CAs
  • Verify hostname matches and certificate validity periods before trusting TLS
  • Fail fast in automation when certificates are expired or use weak algorithms
  • Include intermediate CA certificates on the server to avoid chain errors
  • Integrate automated checks into CI/CD and alerting for certificate expiry

Example use cases

  • Generate a Python script to fetch a server certificate and report expiry and chain issues
  • Create a CI job that fails a build if certificate expiry is within 30 days
  • Diagnose an HTTPS error by checking hostname, SAN entries, and signature algorithm
  • Produce nginx or Apache tls config recommendations when intermediate certs are missing
  • Validate certificates for multiple hosts and output a remediation checklist

FAQ

Can this skill check certificate expiry automatically?

Yes — it can generate scripts or CI checks that report expiry dates and trigger alerts before certificates expire.

Will it fix server configuration issues automatically?

No — it provides precise remediation steps and configuration snippets, but changes must be applied by your infrastructure tooling or administrators.