SSH Penetration Testing workflow skill. Use this skill when the user needs Conduct comprehensive SSH security assessments including enumeration, credential attacks, vulnerability exploitation, tunneling techniques, and post-exploitation activities. This skill covers the complete methodology for testing SSH service security and the operator should preserve the upstream workflow, copied support files, and provenance before merging or handing off.