Executes parallel agent-based vulnerability analysis for injection, XSS, auth, authz, and SSRF. Traces source-to-sink paths, verifies defenses, scores confidence, and generates exploit queues.
From perseusnpx claudepluginhub kaivyy/perseus --plugin perseusThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
This skill executes the Vulnerability Analysis Phase of the Perseus framework. It performs deep-dive white-box analysis on the components identified during the Scan phase.
Goal: Prove the potential for exploitation by finding source-to-sink paths lacking proper defense.
Methodology:
Assign confidence to every finding:
| Confidence | Criteria |
|---|---|
| High | Direct source-to-sink path with clear missing defense and reproducible trigger |
| Medium | Strong path evidence, but one assumption (runtime config/auth state) remains |
| Low | Pattern match only; data flow or trigger path is incomplete |
Prioritize exploit queue in this order:
Launch these 5 agents simultaneously using a single message with multiple Task tool calls:
innerHTML, eval). Verify context-aware escaping. Flag raw HTML rendering."state/nonce in OAuth."For each agent, enforce this loop:
zod.parse)escapeHtml)Each agent must produce a specialized report in deliverables/:
injection_analysis.mdxss_analysis.mdauth_analysis.mdauthz_analysis.mdssrf_analysis.mdFor each finding include:
High | Medium | LowYes | No (and reason)Next Step: Proceed to perseus:exploit to verify findings with Proof-of-Concept.