MCP HubMCP Hub
スキル一覧に戻る

performing-penetration-testing

jeremylongshore
更新日 Today
44 閲覧
712
74
712
GitHubで表示
テストtesting

について

このスキルは、OWASPトップ10リスクのような脆弱性を特定するために、Webアプリケーションの侵入テストを自動化します。自動スキャンを実行し、「run pentest」などのコマンドでトリガーされて詳細なセキュリティレポートを生成します。WebアプリケーションやAPIエンドポイントのセキュリティを評価するセキュリティ診断を実施する際にご利用ください。

クイックインストール

Claude Code

推奨
プラグインコマンド推奨
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git クローン代替
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/performing-penetration-testing

このコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします

ドキュメント

Overview

This skill automates the process of penetration testing for web applications, identifying vulnerabilities and suggesting exploitation techniques. It leverages the penetration-tester plugin to assess web application security posture.

How It Works

  1. Target Identification: Analyzes the user's request to identify the target web application or API endpoint.
  2. Vulnerability Scanning: Executes automated scans to discover potential vulnerabilities, covering OWASP Top 10 risks.
  3. Reporting: Generates a detailed penetration test report, including identified vulnerabilities, risk ratings, and remediation recommendations.

When to Use This Skill

This skill activates when you need to:

  • Perform a penetration test on a web application.
  • Identify vulnerabilities in a web application or API.
  • Assess the security posture of a web application.
  • Generate a report detailing security flaws and remediation steps.

Examples

Example 1: Performing a Full Penetration Test

User request: "Run a penetration test on example.com"

The skill will:

  1. Initiate a comprehensive penetration test on the specified domain.
  2. Generate a detailed report outlining identified vulnerabilities, including SQL injection, XSS, and CSRF.

Example 2: Assessing API Security

User request: "Perform vulnerability assessment on the /api/users endpoint"

The skill will:

  1. Target the specified API endpoint for vulnerability scanning.
  2. Identify potential security flaws in the API, such as authentication bypass or authorization issues, and provide remediation advice.

Best Practices

  • Authorization: Always ensure you have explicit authorization before performing penetration testing on any system.
  • Scope Definition: Clearly define the scope of the penetration test to avoid unintended consequences.
  • Safe Exploitation: Use exploitation techniques carefully to demonstrate vulnerabilities without causing damage.

Integration

This skill can be integrated with other security tools and plugins to enhance vulnerability management and remediation efforts. For example, findings can be exported to vulnerability tracking systems.

Prerequisites

  • Access to codebase and configuration files in {baseDir}/
  • Security scanning tools installed as needed
  • Understanding of security standards and best practices
  • Permissions for security analysis operations

Instructions

  1. Identify security scan scope and targets
  2. Configure scanning parameters and thresholds
  3. Execute security analysis systematically
  4. Analyze findings for vulnerabilities and compliance gaps
  5. Prioritize issues by severity and impact
  6. Generate detailed security report with remediation steps

Output

  • Security scan results with vulnerability details
  • Compliance status reports by standard
  • Prioritized list of security issues by severity
  • Remediation recommendations with code examples
  • Executive summary for stakeholders

Error Handling

If security scanning fails:

  • Verify tool installation and configuration
  • Check file and directory permissions
  • Validate scan target paths
  • Review tool-specific error messages
  • Ensure network access for dependency checks

Resources

  • Security standard documentation (OWASP, CWE, CVE)
  • Compliance framework guidelines (GDPR, HIPAA, PCI-DSS)
  • Security scanning tool documentation
  • Vulnerability remediation best practices

GitHub リポジトリ

jeremylongshore/claude-code-plugins-plus
パス: plugins/security/penetration-tester/skills/penetration-tester
aiautomationclaude-codedevopsmarketplacemcp

関連スキル

content-collections

メタ

This skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.

スキルを見る

evaluating-llms-harness

テスト

This Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.

スキルを見る

cloudflare-turnstile

メタ

This skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.

スキルを見る

cloudflare-cron-triggers

テスト

This skill provides comprehensive knowledge for implementing Cloudflare Cron Triggers to schedule Workers using cron expressions. It covers setting up periodic tasks, maintenance jobs, and automated workflows while handling common issues like invalid cron expressions and timezone problems. Developers can use it for configuring scheduled handlers, testing cron triggers, and integrating with Workflows and Green Compute.

スキルを見る