performing-penetration-testing
について
このスキルは、OWASPトップ10リスクのような脆弱性を特定するために、Webアプリケーションの侵入テストを自動化します。自動スキャンを実行し、「run pentest」などのコマンドでトリガーされて詳細なセキュリティレポートを生成します。WebアプリケーションやAPIエンドポイントのセキュリティを評価するセキュリティ診断を実施する際にご利用ください。
クイックインストール
Claude Code
推奨/plugin add https://github.com/jeremylongshore/claude-code-plugins-plusgit clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/performing-penetration-testingこのコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします
ドキュメント
Overview
This skill automates the process of penetration testing for web applications, identifying vulnerabilities and suggesting exploitation techniques. It leverages the penetration-tester plugin to assess web application security posture.
How It Works
- Target Identification: Analyzes the user's request to identify the target web application or API endpoint.
- Vulnerability Scanning: Executes automated scans to discover potential vulnerabilities, covering OWASP Top 10 risks.
- Reporting: Generates a detailed penetration test report, including identified vulnerabilities, risk ratings, and remediation recommendations.
When to Use This Skill
This skill activates when you need to:
- Perform a penetration test on a web application.
- Identify vulnerabilities in a web application or API.
- Assess the security posture of a web application.
- Generate a report detailing security flaws and remediation steps.
Examples
Example 1: Performing a Full Penetration Test
User request: "Run a penetration test on example.com"
The skill will:
- Initiate a comprehensive penetration test on the specified domain.
- Generate a detailed report outlining identified vulnerabilities, including SQL injection, XSS, and CSRF.
Example 2: Assessing API Security
User request: "Perform vulnerability assessment on the /api/users endpoint"
The skill will:
- Target the specified API endpoint for vulnerability scanning.
- Identify potential security flaws in the API, such as authentication bypass or authorization issues, and provide remediation advice.
Best Practices
- Authorization: Always ensure you have explicit authorization before performing penetration testing on any system.
- Scope Definition: Clearly define the scope of the penetration test to avoid unintended consequences.
- Safe Exploitation: Use exploitation techniques carefully to demonstrate vulnerabilities without causing damage.
Integration
This skill can be integrated with other security tools and plugins to enhance vulnerability management and remediation efforts. For example, findings can be exported to vulnerability tracking systems.
Prerequisites
- Access to codebase and configuration files in {baseDir}/
- Security scanning tools installed as needed
- Understanding of security standards and best practices
- Permissions for security analysis operations
Instructions
- Identify security scan scope and targets
- Configure scanning parameters and thresholds
- Execute security analysis systematically
- Analyze findings for vulnerabilities and compliance gaps
- Prioritize issues by severity and impact
- Generate detailed security report with remediation steps
Output
- Security scan results with vulnerability details
- Compliance status reports by standard
- Prioritized list of security issues by severity
- Remediation recommendations with code examples
- Executive summary for stakeholders
Error Handling
If security scanning fails:
- Verify tool installation and configuration
- Check file and directory permissions
- Validate scan target paths
- Review tool-specific error messages
- Ensure network access for dependency checks
Resources
- Security standard documentation (OWASP, CWE, CVE)
- Compliance framework guidelines (GDPR, HIPAA, PCI-DSS)
- Security scanning tool documentation
- Vulnerability remediation best practices
GitHub リポジトリ
関連スキル
content-collections
メタThis skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.
evaluating-llms-harness
テストThis Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.
cloudflare-turnstile
メタThis skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.
cloudflare-cron-triggers
テストThis skill provides comprehensive knowledge for implementing Cloudflare Cron Triggers to schedule Workers using cron expressions. It covers setting up periodic tasks, maintenance jobs, and automated workflows while handling common issues like invalid cron expressions and timezone problems. Developers can use it for configuring scheduled handlers, testing cron triggers, and integrating with Workflows and Green Compute.
