This skill should be used when the user asks about "framework vulnerabilities", "Next.js security", "Flask security", "Django security", "Rails security", "Spring security", "GraphQL security", "Server Actions", "render_template_string", "SSTI patterns", "redirect SSRF", "mass assignment", "actuator exposure", "SpEL injection", "introspection", or needs to identify framework-specific vulnerability patterns during whitebox pentesting.
From vuln-scoutnpx claudepluginhub allsmog/vuln-scout --plugin vuln-scoutThis skill uses the workspace's default tool permissions.
blade-patterns.mdflask-patterns.mdnextjs-patterns.mdreferences/django-patterns.mdreferences/graphql-patterns.mdreferences/rails-patterns.mdreferences/spring-security-patterns.mdsmarty-patterns.mdtwig-patterns.mdDesigns and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Framework-specific vulnerability patterns that arise from how modern web frameworks handle requests, responses, and data flow. These patterns are more durable than version-specific CVEs.
nextjs-patterns.md - Next.js Server Actions, redirect, Route Handlersflask-patterns.md - Flask/Jinja2 SSTI, unsafe deserializationreferences/django-patterns.md - Django ORM bypass, template injection, CSRF bypass, settings exposure, mass assignment, open redirectreferences/rails-patterns.md - Rails mass assignment, SQL injection, SSTI, command injection, insecure deserialization, unscoped finds, arbitrary file renderreferences/spring-security-patterns.md - Spring SpEL injection, method security misconfiguration, CORS, CSRF, actuator exposure, mass binding, insecure JWTreferences/graphql-patterns.md - GraphQL introspection, query depth/complexity abuse, batching attacks, authorization bypass, error disclosureDuring /full-audit:
Frontend: Next.js with Server Actions
Backend: Flask with Jinja2 templates
Chain:
1. Server Action uses redirect() → Host header controls internal fetch URL
2. SSRF reaches Flask backend on internal port
3. Flask uses render_template_string() with user input
4. SSTI → RCE via Jinja2 payload
This pattern detection focuses on the code behavior, not version numbers.