This skill should be used when the user asks about "vulnerability chains", "chained exploits", "multi-step attacks", "SSRF to RCE", "pivot attacks", or needs to identify how vulnerabilities in different components can be combined during whitebox pentesting.
From vuln-scoutnpx claudepluginhub allsmog/vuln-scout --plugin vuln-scoutThis skill uses the workspace's default tool permissions.
common-chains.mdssrf-chains.mdDesigns and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Modern applications consist of multiple services and frameworks. Critical exploits often require chaining vulnerabilities across components.
Single vulnerabilities may have limited impact:
Chains amplify impact:
# Find orchestration configs
find . -name "docker-compose*.yml" -o -name "supervisord.conf" -o -name "*.k8s.yaml"
# Extract service topology
grep -E "ports:|expose:|links:|depends_on:" docker-compose.yml
# Identify internal-only services
grep -E "127\.0\.0\.1:|localhost:" docker-compose.yml supervisord.conf
Pivot vulnerabilities enable reaching other services:
| Pivot Type | What It Enables |
|---|---|
| SSRF | Reach internal services |
| Header Injection | Modify downstream requests |
| Open Redirect | Phishing, OAuth token theft |
| Path Traversal | Read configs, source code |
| SQL Injection | Read files, execute commands (in some DBs) |
High-impact sinks in each service:
| Sink Type | Impact |
|---|---|
| Template Injection (SSTI) | RCE |
| Command Injection | RCE |
| Deserialization | RCE |
| SQL Injection | Data breach, sometimes RCE |
| File Write | Code execution via webshell |
For each pivot found:
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Next.js │────►│ Flask │────►│ Shell │
│ (SSRF) │ │ (SSTI) │ │ (RCE) │
└─────────────┘ └─────────────┘ └─────────────┘
│ │
│ Host header │ render_template_string()
│ → internal fetch │ with user input
│ │
▼ ▼
Attacker server Jinja2 payload
redirects to executes code
internal Flask
Detection:
┌─────────────┐ ┌─────────────────┐ ┌─────────────┐
│ Web App │────►│ 169.254.169.254 │────►│ AWS/GCP │
│ (SSRF) │ │ (Metadata) │ │ (Creds) │
└─────────────┘ └─────────────────┘ └─────────────┘
Detection:
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ SQLi │────►│ LOAD_FILE │────►│ Config │
│ │ │ (MySQL) │ │ Secrets │
└─────────────┘ └─────────────┘ └─────────────┘
Detection:
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Middleware │────►│ Admin │────►│ Command │
│ Bypass │ │ Panel │ │ Injection │
└─────────────┘ └─────────────┘ └─────────────┘
Detection:
When documenting a chain:
## Chain: [Name]
**Impact:** [RCE/Data Breach/Account Takeover/etc.]
**Components:**
1. [Service A] - [Vulnerability Type] at [location]
2. [Service B] - [Vulnerability Type] at [location]
**Prerequisites:**
- [What attacker needs: account, network position, etc.]
**Flow:**
1. Attacker [action] → [result]
2. [Result] enables [next action]
3. [Final impact]
**Evidence:**
- [File:line] - [code snippet]
- [File:line] - [code snippet]
During /full-audit:
Before reporting a chain as exploitable: