webassessment

安装量: 58
排名: #12811

安装

npx skills add https://github.com/danielmiessler/personal_ai_infrastructure --skill webassessment

Before executing, check for user customizations at: ~/.claude/skills/CORE/USER/SKILLCUSTOMIZATIONS/WebAssessment/

If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.

🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)

You MUST send this notification BEFORE doing anything else when this skill is invoked.

  • Send voice notification:
curl -s -X POST http://localhost:8888/notify \
  -H "Content-Type: application/json" \
  -d '{"message": "Running the WORKFLOWNAME workflow in the WebAssessment skill to ACTION"}' \
  > /dev/null 2>&1 &
  • Output text notification:
Running the **WorkflowName** workflow in the **WebAssessment** skill to ACTION...

This is not optional. Execute this curl command immediately upon skill invocation.

WebAssessment Skill

Security assessment infrastructure integrating reconnaissance, threat modeling, and vulnerability testing.

Workflow Routing

| "understand application", "what does this app do", "map the application" | UnderstandApplication

| "threat model", "attack scenarios", "how would I attack" | CreateThreatModel

| "pentest", "security assessment", "test for vulnerabilities" | Pentest/MasterMethodology

| "fuzz with ffuf", "directory fuzzing", "content discovery" | Ffuf/FfufGuide

| "OSINT", "reconnaissance", "open source intelligence" | Osint/MasterGuide

| "test web app", "Playwright", "browser automation" | Webapp/TestingGuide

| "bug bounty", "bounty programs" | BugBounty/Programs

| "vulnerability analysis with AI", "Gemini analysis" | VulnerabilityAnalysisGemini3

Skill Integration

WebAssessment coordinates with specialized skills:

| Scope Definition | Recon | Corporate structure, domain enumeration

| Target Discovery | Recon | Subdomains, endpoints, ports

| Understanding | WebAssessment | App narrative, user flows, sensitive data

| Threat Modeling | WebAssessment | Attack scenarios, test prioritization

| Injection Testing | PromptInjection | LLM-specific attacks

| Intelligence | OSINT | People, companies, social media

Assessment Workflow

1. Corporate Structure (Recon) → Define scope and targets
2. Subdomain Enumeration (Recon) → Find all domains
3. Endpoint Discovery (Recon) → Extract JS endpoints
4. Understand Application → Build app narrative
5. Create Threat Model → Prioritize attack scenarios
6. Execute Testing → Test against identified threats
7. Report Findings → Document with PoCs

Recon Skill Tools

WebAssessment uses tools from the Recon skill:

# Corporate structure for scope
bun ~/.claude/skills/Recon/Tools/CorporateStructure.ts target.com

# Subdomain enumeration
bun ~/.claude/skills/Recon/Tools/SubdomainEnum.ts target.com

# Endpoint discovery from JavaScript
bun ~/.claude/skills/Recon/Tools/EndpointDiscovery.ts https://target.com

# Port scanning
bun ~/.claude/skills/Recon/Tools/PortScan.ts target.com

# Path discovery
bun ~/.claude/skills/Recon/Tools/PathDiscovery.ts https://target.com

UnderstandApplication Output

Produces structured narrative including:

  • Summary: Purpose, industry, user base, critical functions

  • User Roles: Access levels and capabilities

  • User Flows: Step-by-step processes with sensitive data

  • Technology Stack: Frontend, backend, auth, third-party

  • Attack Surface: Entry points, inputs, file uploads, websockets

CreateThreatModel Output

Generates prioritized attack plan:

  • Threats: OWASP/CWE mapped with risk scores

  • Attack Paths: Multi-step attack scenarios

  • Test Plan: Prioritized with tool suggestions

  • Effort Estimates: Quick/medium/extensive per threat

Threat Categories

| Authentication | Auth mechanisms detected

| Access Control | Multiple user roles

| Injection | All web apps

| Data Exposure | Sensitive data identified

| File Upload | Upload functionality

| API Security | API endpoints

| WebSocket | WebSocket detected

| Business Logic | All web apps

| Payment Security | Payment flows

6-Phase Pentest Methodology

Phase 0: Scoping & Preparation Phase 1: Reconnaissance (Recon skill) Phase 2: Mapping (content discovery) Phase 3: Vulnerability Analysis Phase 4: Exploitation Phase 5: Reporting

Key Principles

  • Authorization first - Never test without explicit permission

  • Understand before testing - Build app narrative first

  • Threat model guides testing - Don't test blindly

  • Breadth then depth - Wide recon, focused exploitation

  • Document everything - Notes, screenshots, commands

Workflow Index

Core Assessment:

  • Workflows/UnderstandApplication.md - Application reconnaissance

  • Workflows/CreateThreatModel.md - Attack scenario generation

Penetration Testing:

  • Workflows/Pentest/MasterMethodology.md - 6-phase methodology

  • Workflows/Pentest/ToolInventory.md - Security tools reference

  • Workflows/Pentest/Reconnaissance.md - Asset discovery

  • Workflows/Pentest/Exploitation.md - Vulnerability testing

Web Fuzzing:

  • Workflows/Ffuf/FfufGuide.md - FFUF fuzzing guide

  • Workflows/Ffuf/FfufHelper.md - Automated fuzzing helper

Bug Bounty:

  • Workflows/BugBounty/Programs.md - Program tracking

  • Workflows/BugBounty/AutomationTool.md - Bounty automation

Web App Testing:

  • Workflows/Webapp/TestingGuide.md - Playwright testing

  • Workflows/Webapp/Examples.md - Testing patterns

OSINT:

  • Workflows/Osint/MasterGuide.md - OSINT methodology

  • Workflows/Osint/Reconnaissance.md - Domain recon

  • Workflows/Osint/SocialMediaIntel.md - SOCMINT

  • Workflows/Osint/Automation.md - SpiderFoot/Maltego

  • Workflows/Osint/MetadataAnalysis.md - ExifTool analysis

AI-Powered:

  • Workflows/VulnerabilityAnalysisGemini3.md - Gemini deep analysis

Examples

Example 1: Full assessment workflow

User: "Security assessment on app.example.com"
→ Run UnderstandApplication to build narrative
→ Run CreateThreatModel to prioritize testing
→ Follow MasterMethodology with threat model guidance
→ Report findings with OWASP/CWE references

Example 2: Quick threat model

User: "How would I attack this app?"
→ Run CreateThreatModel on target
→ Get prioritized attack paths
→ Get test plan with tool suggestions

Example 3: Integrate with Recon

User: "Assessment on target.com including all subdomains"
→ CorporateStructure (Recon) → Find parent/child companies
→ SubdomainEnum (Recon) → Find all subdomains
→ EndpointDiscovery (Recon) → Extract JS endpoints
→ UnderstandApplication → Build app narrative
→ CreateThreatModel → Generate attack plan
返回排行榜