This skill should be used when the user asks about "vulnerability patterns", "how to find SQL injection", "XSS patterns", "command injection techniques", "OWASP vulnerabilities", "common web vulnerabilities", "exploitation patterns", or needs to understand how specific vulnerability classes work during whitebox pentesting.
From vuln-scoutnpx claudepluginhub allsmog/vuln-scout --plugin vuln-scoutThis skill uses the workspace's default tool permissions.
references/access-control.mdreferences/auth-bypass.mdreferences/deserialization-attacks.mdreferences/injection-attacks.mdreferences/race-conditions.mdreferences/reentrancy-solidity.mdreferences/state-before-validation.mdDesigns and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Provide comprehensive knowledge of common web vulnerability patterns for whitebox penetration testing. Understanding these patterns enables identification of security flaws during code review and guides exploitation techniques.
Activate this skill when:
| Rank | Category | Code Indicators | Related Skill |
|---|---|---|---|
| A01 | Broken Access Control | Missing auth checks, IDOR patterns | business-logic |
| A02 | Cryptographic Failures | Weak algorithms, hardcoded keys | cryptographic-failures |
| A03 | Injection | User input in queries/commands | vuln-patterns (this skill) |
| A04 | Insecure Design | Logic flaws, missing controls | business-logic |
| A05 | Security Misconfiguration | Debug enabled, default creds | security-misconfiguration |
| A06 | Vulnerable and Outdated Components | Dependency vulns, build pipeline | (out of scope) |
| A07 | Identification and Authentication Failures | Weak session, credential issues | vuln-patterns (this skill) |
| A08 | Software and Data Integrity Failures | Deserialization, CI/CD issues | vuln-patterns (this skill) |
| A09 | Security Logging and Monitoring Failures | Missing logs, log injection | logging-failures |
| A10 | Server-Side Request Forgery | Attacker-controlled outbound fetches | vulnerability-chains, framework-patterns |
See owasp-2025 skill for complete mapping with CWE references.
Pattern: User input concatenated into SQL queries
Indicators:
Exploitation Flow:
Risk Impact: Data breach, authentication bypass, RCE (in some cases)
Pattern: User input passed to system command functions
Indicators:
Exploitation Flow:
Risk Impact: Remote Code Execution, full system compromise
Types:
Indicators:
Risk Impact: Session hijacking, credential theft, malware distribution
Pattern: User input in file path operations
Indicators:
Exploitation Flow:
Risk Impact: Information disclosure, source code leak, potential RCE
Pattern: Untrusted data passed to deserialization functions
Indicators:
Exploitation Flow:
Risk Impact: Remote Code Execution
Pattern: User-controlled URLs in server-side requests
Indicators:
Exploitation Flow:
Risk Impact: Internal network access, cloud metadata exposure
When SSRF response is not directly returned to the attacker, consider these exfiltration methods:
| Vector | How It Works | Detection |
|---|---|---|
| External Callback | SSRF visits attacker-controlled URL with data | Check if outbound requests are allowed |
| DNS Exfiltration | Data encoded in subdomain (e.g., secret.evil.com) | Works even with firewall restrictions |
| Cache Poisoning | Response cached, retrieved later by attacker | Check proxy cache config for static extensions |
| Error-Based | Error messages leak response data | Check error handling and logging |
| Timing/Blind | Response time reveals information | Measure response latency variations |
| File Write | Write response to accessible location | Check for file write primitives |
Cache-Based Exfiltration Pattern (commonly missed):
1. SSRF makes request to /sensitive-endpoint.png
2. Proxy caches response (thinks it's static file)
3. Attacker requests /sensitive-endpoint.png
4. Gets cached sensitive data
See cache-poisoning skill for detailed detection patterns.
Pattern: User input rendered in server-side templates
Indicators:
Exploitation Flow:
Risk Impact: Remote Code Execution
Use the dangerous-functions skill to find security-sensitive functions.
Use the data-flow-tracing skill to trace user input to sinks.
Match code patterns against known vulnerability types.
Consider filters, authentication, impact, and bypass potential.
For detailed exploitation techniques:
references/injection-attacks.md - SQLi, Command Injection, LDAP Injectionreferences/deserialization-attacks.md - PHP, Java, Python, .NET gadgetsreferences/access-control.md - IDOR, privilege escalation, authorization bypassreferences/auth-bypass.md - Authentication bypass, session attacks, JWT flawsreferences/race-conditions.md - TOCTOU, double-spend, concurrency vulnerabilities