Security audit workflow - vulnerability scan β verification
npx skills add Anshin-Health-Solutions/superpai --skill "web-assessment"
Install specific skill from multi-skill repository
# Description
Web security assessment with vulnerability scanning, penetration testing methodology, and professional reporting.
# SKILL.md
name: web-assessment
description: "Web security assessment with vulnerability scanning, penetration testing methodology, and professional reporting."
triggers:
- web assessment
- pentest
- security testing
- vulnerability scan
- security audit
Web Assessment Skill
Professional web security assessment following OWASP methodology.
Scope
- Vulnerability scanning and identification
- Authentication and authorization testing
- Input validation testing (XSS, SQLi, etc.)
- Configuration review
- API security testing
Process
- Reconnaissance β Map the attack surface (endpoints, parameters, auth flows)
- Scanning β Automated vulnerability detection
- Testing β Manual verification of findings
- Exploitation β Proof-of-concept for confirmed vulnerabilities
- Reporting β Professional report with severity ratings and remediation
Requirements
- Explicit authorization from the target owner
- Defined scope (URLs, endpoints, methods)
- Clear rules of engagement
OWASP Top 10 Testing Checklist
Work through each category systematically:
| # | Category | Key Tests |
|---|---|---|
| A01 | Broken Access Control | IDOR, privilege escalation, CORS misconfig |
| A02 | Cryptographic Failures | Weak TLS, unencrypted sensitive data |
| A03 | Injection | SQLi, XSS, command injection, SSTI |
| A04 | Insecure Design | Business logic flaws, rate limiting absent |
| A05 | Security Misconfiguration | Default creds, verbose errors, open directories |
| A06 | Vulnerable Components | Outdated libs, known CVEs in dependencies |
| A07 | Auth Failures | Weak passwords, no MFA, session fixation |
| A08 | Integrity Failures | Unsigned updates, insecure deserialization |
| A09 | Logging Failures | No audit trail, sensitive data in logs |
| A10 | SSRF | Internal network access via forged requests |
Tool Commands
# Subdomain enumeration
subfinder -d target.com -o subdomains.txt
amass enum -d target.com
# Port and service scanning
nmap -sV -sC -oA nmap_output target.com
# Web crawler and endpoint discovery
katana -u https://target.com -o endpoints.txt
gau target.com | tee urls.txt
# Vulnerability scanning
nikto -h https://target.com -o nikto_report.txt
nuclei -u https://target.com -t cves/ -t exposures/
# Parameter discovery
arjun -u https://target.com/api/endpoint
# Directory brute force
ffuf -w /usr/share/wordlists/dirb/common.txt -u https://target.com/FUZZ
# SSL/TLS analysis
testssl.sh https://target.com
# SQLi testing
sqlmap -u "https://target.com/page?id=1" --dbs --batch
# XSS testing
dalfox url "https://target.com/page?q=test"
Manual Testing Patterns
Authentication Testing
- Try default credentials: admin/admin, admin/password, test/test
- Attempt username enumeration via response timing differences
- Test password reset flows for token predictability
- Check "remember me" cookie entropy and expiration
Authorization Testing
- Access resources as User A using User B's IDs (IDOR)
- Attempt horizontal and vertical privilege escalation
- Test API endpoints without authentication headers
- Manipulate role/permission values in JWT payloads
Input Validation
# XSS payloads to try
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
javascript:alert(1)
# SQLi detection
' OR '1'='1
1; DROP TABLE users--
1 UNION SELECT null,null,null--
# SSTI detection
{{7*7}} ${7*7} #{7*7}
CVSS Scoring Quick Reference
| Score | Severity | Action |
|---|---|---|
| 9.0-10.0 | Critical | Immediate remediation required |
| 7.0-8.9 | High | Remediate within 7 days |
| 4.0-6.9 | Medium | Remediate within 30 days |
| 0.1-3.9 | Low | Remediate in next release cycle |
Report Template
# Security Assessment Report β [Target]
**Date:** [Date]
**Scope:** [URLs and endpoints tested]
**Authorization:** [Document confirming permission]
## Executive Summary
[2-3 paragraphs for non-technical leadership]
## Findings
### [FINDING-001] β [Title] β CRITICAL/HIGH/MEDIUM/LOW
- **CVSS Score:** X.X
- **Description:** What the vulnerability is
- **Evidence:** Request/response showing the issue
- **Impact:** What an attacker can achieve
- **Remediation:** Specific fix with code example
- **References:** CVE, CWE, OWASP link
## Remediation Summary
| Finding | Severity | Status | Owner |
|---------|----------|--------|-------|
## Retesting Notes
[Guidance for confirming fixes]
Red Flags / Warnings
- Never test without written authorization β unauthorized testing is illegal
- Do not run denial-of-service or destructive tests without explicit approval
- Avoid storing sensitive data discovered during testing
- Cease testing immediately if you encounter evidence of prior compromise
- Document all actions with timestamps for legal defensibility
Output: Professional security assessment report with CVSS scores and remediation guidance.
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.