Skip to main content

Web Vulnerability Analysis Skill

Analyzes web vulnerabilities using AI agents and tools for effective security assessments and penetration testing.

Install this skill

or
47/100

Security score

The Web Vulnerability Analysis Skill skill was audited on May 12, 2026 and we found 33 security issues across 3 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 113

Curl to non-GitHub URL

SourceSKILL.md
113curl -s -I http://target.com | grep Server # ❌ 不专业
medium line 115

Curl to non-GitHub URL

SourceSKILL.md
115# 错误:自己规划 tasks 用 curl
medium line 117

Curl to non-GitHub URL

SourceSKILL.md
117Task 2: curl http://target.com/robots.txt # ❌
medium line 686

Curl to non-GitHub URL

SourceSKILL.md
686curl http://localhost:5000/health
low line 51

Access to hidden dotfiles in home directory

SourceSKILL.md
51source ~/.claude/skills/web-vuln-analyzer/docker/.env
low line 54

Access to hidden dotfiles in home directory

SourceSKILL.md
54cd ~/.claude/skills/web-vuln-analyzer
low line 674

Access to hidden dotfiles in home directory

SourceSKILL.md
674cd ~/.claude/skills/web-vuln-analyzer
low line 51

Access to .env file

SourceSKILL.md
51source ~/.claude/skills/web-vuln-analyzer/docker/.env
medium line 94

Access to .env file

SourceSKILL.md
94**重要**: 在 `docker/.env` 中设置:
low line 677

Access to .env file

SourceSKILL.md
677cat > docker/.env << 'EOF'
low line 830

Access to .env file

SourceSKILL.md
830解决: 在 docker/.env 中设置 CAI_TIMEOUT=1800
low line 836

Access to .env file

SourceSKILL.md
836解决: 在 docker/.env 中设置 CAI_MAX_TURNS=200
low line 70

External URL reference

SourceSKILL.md
70prompt='识别 http://target.com 的技术指纹',
low line 71

External URL reference

SourceSKILL.md
71target='http://target.com',
low line 104

External URL reference

SourceSKILL.md
104| `/web-vuln-analyze http://target.com "识别指纹"` | 调用 `bug_bounty_agent`,让它用 whatweb/nmap |
low line 105

External URL reference

SourceSKILL.md
105| `/web-vuln-analyze http://target.com` (无报告) | 调用 `redteam_agent`,自动渗透 |
low line 106

External URL reference

SourceSKILL.md
106| `/web-vuln-analyze http://target.com report.xml` | 调用 `bug_bounty_agent`,验证报告 |
low line 107

External URL reference

SourceSKILL.md
107| `/web-vuln-analyze http://target.com "SQL注入测试"` | 调用 `bug_bounty_agent`,让它用 sqlmap |
low line 113

External URL reference

SourceSKILL.md
113curl -s -I http://target.com | grep Server # ❌ 不专业
low line 116

External URL reference

SourceSKILL.md
116Task 1: curl http://target.com # ❌ 应该调用 CAI
low line 117

External URL reference

SourceSKILL.md
117Task 2: curl http://target.com/robots.txt # ❌
low line 577

External URL reference

SourceSKILL.md
577target: "https://example.com/login"
low line 686

External URL reference

SourceSKILL.md
686curl http://localhost:5000/health
low line 689

External URL reference

SourceSKILL.md
689/web-vuln-analyze http://dvwa.local /path/to/burp-report.xml # Mode 1
low line 690

External URL reference

SourceSKILL.md
690/web-vuln-analyze http://dvwa.local /path/to/sonarqube.json # Mode 2
low line 691

External URL reference

SourceSKILL.md
691/web-vuln-analyze http://dvwa.local # Mode 3
low line 692

External URL reference

SourceSKILL.md
692/web-vuln-analyze http://dvwa.local "test for sql injection" # Mode 4
low line 733

External URL reference

SourceSKILL.md
733**PoC**: `https://phemex.com/%5cgoogle.com/%2f%2e%2e`
low line 740

External URL reference

SourceSKILL.md
740/web-vuln-analyze https://phemex.com ~/report/phemexwm-140/report.md
low line 747

External URL reference

SourceSKILL.md
747- Target: https://phemex.com
low line 748

External URL reference

SourceSKILL.md
748- PoC URL: https://phemex.com/%5cgoogle.com/%2f%2e%2e
low line 780

External URL reference

SourceSKILL.md
780Final URL: https://phemex.com/404
low line 786

External URL reference

SourceSKILL.md
786Final URL: https://www.google.com/
Scanned on May 12, 2026
View Security Dashboard
Installation guide →