web-security-testing
Test Web Apps for OWASP Top 10 Vulnerabilities
This workflow guides you through comprehensive security testing of web applications following the OWASP Top 10 methodology, from reconnaissance to reporting.
Baixar o ZIP da skill
Upload no Claude
Vá em Configurações → Capacidades → Skills → Upload skill
Ative e comece a usar
Testar
A utilizar "web-security-testing". Use @web-security-testing to test my web application at https://example.com
Resultado esperado:
- Starting Phase 1: Reconnaissance
- - Mapping application surface
- - Identifying technologies used
- - Discovering endpoints
- - Finding subdomains
- - Documenting initial findings
- Ready to proceed to Phase 2: Injection Testing
A utilizar "web-security-testing". We are in Phase 3 of @web-security-testing. Test for XSS in the search feature.
Resultado esperado:
- Phase 3: XSS Testing
- Testing vectors: reflected, stored, DOM-based
- Test cases to execute:
- - <script>alert(1)</script>
- - <img src=x onerror=alert(1)>
- - <svg onload=alert(1)>
- Document all successful bypasses with proof of concept
Auditoria de Segurança
SeguroStatic analysis flagged 33 potential issues (31 external_commands, 2 weak cryptographic algorithms). After evaluation, all findings are FALSE POSITIVES. The external_commands detections are markdown code formatting (backticks) used for skill references like @scanning-tools, not actual shell execution. The cryptographic flags are false positives from keywords in the OWASP checklist. This is a legitimate security testing workflow with no malicious code.
Problemas de Alto Risco (1)
Problemas de Risco Médio (1)
Pontuação de qualidade
O Que Você Pode Construir
Comprehensive Security Assessment
Conduct a full security audit of a web application following structured OWASP Top 10 methodology with detailed phase-by-phase testing.
Bug Bounty Reconnaissance
Use the workflow for bug bounty hunting to systematically test target applications for vulnerabilities in a structured manner.
Security Validation
Validate that security controls are properly implemented in a web application before production deployment.
Tente Estes Prompts
Use @web-security-testing to test my web application for security vulnerabilities. Target: [URL]
We are in Phase 2 of @web-security-testing. Test for SQL injection on the login form at [URL] with parameter [param]
Following Phase 3 of @web-security-testing, test for XSS vulnerabilities in the comment section at [URL]
We have completed all phases of @web-security-testing. Generate a security report summarizing findings and remediation steps.
Melhores Práticas
- Always obtain proper authorization before testing any application
- Follow the workflow phases in order for comprehensive coverage
- Document all findings with proof of concept for each vulnerability
- Invoke referenced skills for specialized testing in each phase
Evitar
- Skipping phases - each phase builds on previous reconnaissance
- Testing in production without authorization
- Not documenting findings with reproduction steps
- Ignoring low-severity findings without proper risk assessment
Perguntas Frequentes
Does this skill execute actual exploits?
Do I need other skills to use this workflow?
Is this suitable for production testing?
What OWASP categories are covered?
Can I customize this workflow?
What output format should I use for reports?
Detalhes do Desenvolvedor
Autor
sickn33Licença
MIT
Repositório
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/web-security-testingReferência
main
Estrutura de arquivos
📄 SKILL.md