From find-cve-agent
Generates polished, human-sounding vulnerability disclosure reports for GHSA, HackerOne, and email. Auto-selects channel, calculates CVSS, adapts tone.
npx claudepluginhub byamb4/find-cve-agentThis skill uses the workspace's default tool permissions.
- `/report` command invoked
Provides CVSS 3.1 vector examples, executive summary template, technical finding template, and remediation language for pentest reports. Useful for drafting security assessments.
Drafts structured security findings from vulnerability observations via workflow: load knowledge, gather context, construct title, estimate severity, draft sections, write file.
Generates Markdown audit reports for confirmed smart contract vulnerabilities, including impact, code snippets, and fixes; writes to findings/ files for submission.
Share bugs, ideas, or general feedback.
/report command invokedReports go to real maintainers. They can spot AI-generated text instantly and will take your report less seriously.
Avoid:
Do:
| Channel | Tone | Length | Format |
|---|---|---|---|
| GHSA | Professional, structured | Medium (300-500 words) | Markdown with headers |
| HackerOne | Concise, impact-focused | Short-medium (200-400 words) | Their template format |
| Email (first contact) | Friendly, brief | Short (100-150 words) | Plain text, no attachments |
| Email (full report) | Professional, thorough | Medium (300-500 words) | Plain text or markdown |
| Follow-up / clarification | Conversational, helpful | Short (50-150 words) | Plain text |
Read these files from the target directory:
findings.md — Hunter's technical detailsverdict.md — Validator's confirmed verdict with CVSSpoc_*.py or poc_*.js — Working PoC codebrief.md — Target metadata (version, repo URL, maintainer contacts)Does the project have a HackerOne program?
YES -> HackerOne report
NO -> Does the project have SECURITY.md with email?
YES -> Email first, then GHSA if no response in 7 days
NO -> Does the repo have Security Advisories enabled?
YES -> GHSA
NO -> Find maintainer email from package.json/GitHub profile -> Email
Use CVSS 3.1 calculator logic:
| Factor | Question | Values |
|---|---|---|
| AV (Attack Vector) | How does attacker reach it? | N=network, A=adjacent, L=local, P=physical |
| AC (Attack Complexity) | Special conditions needed? | L=no special conditions, H=race/specific config |
| PR (Privileges Required) | Auth needed? | N=none, L=low user, H=admin |
| UI (User Interaction) | Victim must do something? | N=no, R=yes (click link, open file) |
| S (Scope) | Breaks out of component? | U=no, C=yes (sandbox escape, affects other users) |
| C (Confidentiality) | Data exposed? | N=none, L=limited, H=all data |
| I (Integrity) | Data modified? | N=none, L=limited, H=full control |
| A (Availability) | Service disrupted? | N=none, L=degraded, H=full DoS |
Common patterns:
Select the appropriate template from templates/ and fill it in. Then apply these rewrites:
Humanization pass:
Structure check:
Format: [Security] [SEVERITY] vulnerability in [PROJECT] [VERSION]
Good: [Security] HIGH severity path traversal in archiver v5.3.1
Bad: Security Vulnerability Found In Your Project
Bad: URGENT: Critical Security Issue Detected
Hi [name],
Just following up on my security report from [date]. I understand you may be busy — happy to provide any additional details or clarify anything about the finding.
If you'd prefer I submit this through a different channel (GitHub Security Advisory, etc.), I'm happy to do that instead.
Best,
[name]
Sure — here's the additional detail:
[answer their specific question concisely]
The key thing is [restate the core issue in one sentence]. Happy to jump on a call if that would be easier.
Thanks for looking at this. I see your point about [their argument].
My reasoning for [SEVERITY] was [brief CVSS justification]. But I'm happy to adjust — the important thing is getting it fixed. Would [LOWER_SEVERITY] work better for you?
I understand — thanks for taking the time to review it.
Would you be open to adding a note in the README about [the risk] so users handling untrusted input are aware? That way the behavior is documented and users can make an informed decision.
Either way, thanks for your time.
Install blader/humanizer — a Claude Code skill that automatically removes signs of AI-generated writing. Run it as a final pass on any report before submitting.
# Install the humanizer skill
git clone https://github.com/blader/humanizer.git .claude/skills/humanizer
After drafting a report, invoke /humanizer to clean up AI patterns automatically. This catches things the manual humanization pass might miss.