Scanning for XSS Vulnerabilities
About
This skill scans code for reflected, stored, and DOM-based XSS vulnerabilities across HTML, JavaScript, CSS, and URL contexts. It suggests safe proof-of-concept payloads and is triggered by commands like "/xss" or requests to check for XSS. Use it during code reviews, security audits, and before deploying web applications.
Documentation
Overview
This skill empowers Claude to proactively identify and report XSS vulnerabilities within your codebase. By leveraging advanced detection techniques, including context-aware analysis and WAF bypass testing, this skill ensures your web applications are resilient against common XSS attack vectors. It provides detailed insights into vulnerability types and offers guidance on remediation strategies.
How It Works
- Activation: Claude recognizes the user's intent to scan for XSS vulnerabilities through specific trigger phrases like "scan for XSS" or the shortcut "/xss".
- Code Analysis: The plugin analyzes the codebase, identifying potential XSS vulnerabilities across different contexts (HTML, JavaScript, CSS, URL).
- Vulnerability Detection: The plugin detects reflected, stored, and DOM-based XSS vulnerabilities by injecting various payloads and analyzing the responses.
- Reporting: The plugin generates a report highlighting identified vulnerabilities, their location in the code, and recommended remediation steps.
When to Use This Skill
This skill activates when you need to:
- Perform a security audit of your web application.
- Review code for potential XSS vulnerabilities.
- Ensure compliance with security standards.
- Test the effectiveness of your Content Security Policy (CSP).
- Identify and mitigate XSS vulnerabilities before deploying to production.
Examples
Example 1: Detecting Reflected XSS
User request: "scan for XSS vulnerabilities in the search functionality"
The skill will:
- Analyze the code related to the search functionality.
- Identify a reflected XSS vulnerability in how search queries are displayed.
- Report the vulnerability, including the affected code snippet and a suggested fix using proper sanitization.
Example 2: Identifying Stored XSS
User request: "/xss check the comment submission form"
The skill will:
- Analyze the comment submission form and its associated backend code.
- Detect a stored XSS vulnerability where user comments are saved to the database without sanitization.
- Report the vulnerability, highlighting the unsanitized comment storage and suggesting the use of a sanitization library like
sanitizeHtml.
Best Practices
- Sanitization: Always sanitize user input before displaying it on the page. Use appropriate escaping functions for the specific context (HTML, JavaScript, URL).
- Content Security Policy (CSP): Implement a strong CSP to restrict the sources from which the browser can load resources, mitigating the impact of XSS vulnerabilities.
- Regular Updates: Keep your web application framework and libraries up to date to patch known XSS vulnerabilities.
Integration
This skill complements other security-focused plugins by providing targeted XSS vulnerability detection. It can be integrated with code review tools to automate security checks and provide developers with immediate feedback on potential XSS issues.
Quick Install
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus-skills/tree/main/skill-adapterCopy and paste this command in Claude Code to install this skill
GitHub 仓库
Related Skills
sglang
MetaSGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.
evaluating-llms-harness
TestingThis Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.
llamaguard
OtherLlamaGuard is Meta's 7-8B parameter model for moderating LLM inputs and outputs across six safety categories like violence and hate speech. It offers 94-95% accuracy and can be deployed using vLLM, Hugging Face, or Amazon SageMaker. Use this skill to easily integrate content filtering and safety guardrails into your AI applications.
langchain
MetaLangChain is a framework for building LLM applications using agents, chains, and RAG pipelines. It supports multiple LLM providers, offers 500+ integrations, and includes features like tool calling and memory management. Use it for rapid prototyping and deploying production systems like chatbots, autonomous agents, and question-answering services.
