Skip to main content

CTF Web Solver

Assists users in solving web security challenges during CTF competitions by analyzing vulnerabilities and constructing effective attack payloads.

Install this skill

or
0/100

Security score

The CTF Web Solver skill was audited on Feb 9, 2026 and we found 33 security issues across 5 threat categories, including 10 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 401

Eval function call - arbitrary code execution

SourceSKILL.md
401<script>eval(atob('YWxlcnQoMSk='))</script>
medium line 410

Template literal with variable interpolation in command context

SourceSKILL.md
410```bash
medium line 454

Template literal with variable interpolation in command context

SourceSKILL.md
454```python
medium line 121

Curl to non-GitHub URL

SourceSKILL.md
121curl -I http://target.com # HTTP 响应头
medium line 131

Curl to non-GitHub URL

SourceSKILL.md
131curl http://target.com/robots.txt
medium line 132

Curl to non-GitHub URL

SourceSKILL.md
132curl http://target.com/.git/HEAD
medium line 133

Curl to non-GitHub URL

SourceSKILL.md
133curl http://target.com/.svn/entries
medium line 134

Curl to non-GitHub URL

SourceSKILL.md
134curl http://target.com/www.zip
medium line 135

Curl to non-GitHub URL

SourceSKILL.md
135curl http://target.com/backup.sql
high line 242

Access to /etc/passwd

SourceSKILL.md
2422. 实体读取 → file:///etc/passwd
high line 412

Access to /etc/passwd

SourceSKILL.md
412cat${IFS}/etc/passwd
high line 413

Access to /etc/passwd

SourceSKILL.md
413cat$IFS$9/etc/passwd
high line 414

Access to /etc/passwd

SourceSKILL.md
414{cat,/etc/passwd}
high line 415

Access to /etc/passwd

SourceSKILL.md
415cat</etc/passwd
high line 418

Access to /etc/passwd

SourceSKILL.md
418ca\t /etc/passwd
high line 419

Access to /etc/passwd

SourceSKILL.md
419c'a't /etc/passwd
high line 420

Access to /etc/passwd

SourceSKILL.md
420c"a"t /etc/passwd
high line 421

Access to /etc/passwd

SourceSKILL.md
421/???/c?t /etc/passwd
low line 466

Access to .env file

SourceSKILL.md
466{{_self.env.registerUndefinedFilterCallback("exec")}}{{_self.env.getFilter("id")}}
low line 401

Base64 decode via atob()

SourceSKILL.md
401<script>eval(atob('YWxlcnQoMSk='))</script>
low line 400

Unicode escape sequences

SourceSKILL.md
400<svg onload=\u0061lert(1)>
low line 121

External URL reference

SourceSKILL.md
121curl -I http://target.com # HTTP 响应头
low line 122

External URL reference

SourceSKILL.md
122whatweb http://target.com # 技术栈识别
low line 126

External URL reference

SourceSKILL.md
126dirsearch -u http://target.com -e php,html,txt,bak
low line 127

External URL reference

SourceSKILL.md
127gobuster dir -u http://target.com -w /usr/share/wordlists/dirb/common.txt
low line 128

External URL reference

SourceSKILL.md
128ffuf -u http://target.com/FUZZ -w wordlist.txt
low line 131

External URL reference

SourceSKILL.md
131curl http://target.com/robots.txt
low line 132

External URL reference

SourceSKILL.md
132curl http://target.com/.git/HEAD
low line 133

External URL reference

SourceSKILL.md
133curl http://target.com/.svn/entries
low line 134

External URL reference

SourceSKILL.md
134curl http://target.com/www.zip
low line 135

External URL reference

SourceSKILL.md
135curl http://target.com/backup.sql
low line 243

External URL reference

SourceSKILL.md
2433. SSRF 利用 → http://internal
low line 404

External URL reference

SourceSKILL.md
404<script src="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.0.1/angular.min.js"></script>
Scanned on Feb 9, 2026
View Security Dashboard
Installation guide →