Before executing, check for user customizations at:
~/.claude/skills/CORE/USER/SKILLCUSTOMIZATIONS/WebAssessment/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)
You MUST send this notification BEFORE doing anything else when this skill is invoked.
- Send voice notification:
curl -s -X POST http://localhost:8888/notify \
-H "Content-Type: application/json" \
-d '{"message": "Running the WORKFLOWNAME workflow in the WebAssessment skill to ACTION"}' \
> /dev/null 2>&1 &
- Output text notification:
Running the **WorkflowName** workflow in the **WebAssessment** skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
WebAssessment Skill
Security assessment infrastructure integrating reconnaissance, threat modeling, and vulnerability testing.
Workflow Routing
| "understand application", "what does this app do", "map the application" | UnderstandApplication
| "threat model", "attack scenarios", "how would I attack" | CreateThreatModel
| "pentest", "security assessment", "test for vulnerabilities" | Pentest/MasterMethodology
| "fuzz with ffuf", "directory fuzzing", "content discovery" | Ffuf/FfufGuide
| "OSINT", "reconnaissance", "open source intelligence" | Osint/MasterGuide
| "test web app", "Playwright", "browser automation" | Webapp/TestingGuide
| "bug bounty", "bounty programs" | BugBounty/Programs
| "vulnerability analysis with AI", "Gemini analysis" | VulnerabilityAnalysisGemini3
Skill Integration
WebAssessment coordinates with specialized skills:
| Scope Definition | Recon | Corporate structure, domain enumeration
| Target Discovery | Recon | Subdomains, endpoints, ports
| Understanding | WebAssessment | App narrative, user flows, sensitive data
| Threat Modeling | WebAssessment | Attack scenarios, test prioritization
| Injection Testing | PromptInjection | LLM-specific attacks
| Intelligence | OSINT | People, companies, social media
Assessment Workflow
1. Corporate Structure (Recon) → Define scope and targets
2. Subdomain Enumeration (Recon) → Find all domains
3. Endpoint Discovery (Recon) → Extract JS endpoints
4. Understand Application → Build app narrative
5. Create Threat Model → Prioritize attack scenarios
6. Execute Testing → Test against identified threats
7. Report Findings → Document with PoCs
Recon Skill Tools
WebAssessment uses tools from the Recon skill:
# Corporate structure for scope
bun ~/.claude/skills/Recon/Tools/CorporateStructure.ts target.com
# Subdomain enumeration
bun ~/.claude/skills/Recon/Tools/SubdomainEnum.ts target.com
# Endpoint discovery from JavaScript
bun ~/.claude/skills/Recon/Tools/EndpointDiscovery.ts https://target.com
# Port scanning
bun ~/.claude/skills/Recon/Tools/PortScan.ts target.com
# Path discovery
bun ~/.claude/skills/Recon/Tools/PathDiscovery.ts https://target.com
UnderstandApplication Output
Produces structured narrative including:
-
Summary: Purpose, industry, user base, critical functions
-
User Roles: Access levels and capabilities
-
User Flows: Step-by-step processes with sensitive data
-
Technology Stack: Frontend, backend, auth, third-party
-
Attack Surface: Entry points, inputs, file uploads, websockets
CreateThreatModel Output
Generates prioritized attack plan:
-
Threats: OWASP/CWE mapped with risk scores
-
Attack Paths: Multi-step attack scenarios
-
Test Plan: Prioritized with tool suggestions
-
Effort Estimates: Quick/medium/extensive per threat
Threat Categories
| Authentication | Auth mechanisms detected
| Access Control | Multiple user roles
| Injection | All web apps
| Data Exposure | Sensitive data identified
| File Upload | Upload functionality
| API Security | API endpoints
| WebSocket | WebSocket detected
| Business Logic | All web apps
| Payment Security | Payment flows
6-Phase Pentest Methodology
Phase 0: Scoping & Preparation Phase 1: Reconnaissance (Recon skill) Phase 2: Mapping (content discovery) Phase 3: Vulnerability Analysis Phase 4: Exploitation Phase 5: Reporting
Key Principles
-
Authorization first - Never test without explicit permission
-
Understand before testing - Build app narrative first
-
Threat model guides testing - Don't test blindly
-
Breadth then depth - Wide recon, focused exploitation
-
Document everything - Notes, screenshots, commands
Workflow Index
Core Assessment:
-
Workflows/UnderstandApplication.md- Application reconnaissance -
Workflows/CreateThreatModel.md- Attack scenario generation
Penetration Testing:
-
Workflows/Pentest/MasterMethodology.md- 6-phase methodology -
Workflows/Pentest/ToolInventory.md- Security tools reference -
Workflows/Pentest/Reconnaissance.md- Asset discovery -
Workflows/Pentest/Exploitation.md- Vulnerability testing
Web Fuzzing:
-
Workflows/Ffuf/FfufGuide.md- FFUF fuzzing guide -
Workflows/Ffuf/FfufHelper.md- Automated fuzzing helper
Bug Bounty:
-
Workflows/BugBounty/Programs.md- Program tracking -
Workflows/BugBounty/AutomationTool.md- Bounty automation
Web App Testing:
-
Workflows/Webapp/TestingGuide.md- Playwright testing -
Workflows/Webapp/Examples.md- Testing patterns
OSINT:
-
Workflows/Osint/MasterGuide.md- OSINT methodology -
Workflows/Osint/Reconnaissance.md- Domain recon -
Workflows/Osint/SocialMediaIntel.md- SOCMINT -
Workflows/Osint/Automation.md- SpiderFoot/Maltego -
Workflows/Osint/MetadataAnalysis.md- ExifTool analysis
AI-Powered:
Workflows/VulnerabilityAnalysisGemini3.md- Gemini deep analysis
Examples
Example 1: Full assessment workflow
User: "Security assessment on app.example.com"
→ Run UnderstandApplication to build narrative
→ Run CreateThreatModel to prioritize testing
→ Follow MasterMethodology with threat model guidance
→ Report findings with OWASP/CWE references
Example 2: Quick threat model
User: "How would I attack this app?"
→ Run CreateThreatModel on target
→ Get prioritized attack paths
→ Get test plan with tool suggestions
Example 3: Integrate with Recon
User: "Assessment on target.com including all subdomains"
→ CorporateStructure (Recon) → Find parent/child companies
→ SubdomainEnum (Recon) → Find all subdomains
→ EndpointDiscovery (Recon) → Extract JS endpoints
→ UnderstandApplication → Build app narrative
→ CreateThreatModel → Generate attack plan