Document and track security findings with structured severity ratings, evidence references, dedup checking, and chaining metadata
From greyhatccnpx claudepluginhub overtimepog/greyhatcc --plugin greyhatccThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
/greyhatcc:findings add "<title>" - Add new finding/greyhatcc:findings list - List all findings/greyhatcc:findings update <id> - Update finding statusBefore executing this skill:
.greyhatcc/scope.json — verify target is in scope, note exclusions.greyhatcc/hunt-state.json — check active phase, resume contextfindings_log.md, tested.json, gadgets.json — avoid duplicating workBefore adding or updating findings, also follow the context-loader protocol:
Before adding ANY finding, run through these gates:
### [SEVERITY] Finding Title
- **ID**: F-001
- **Severity**: CRITICAL | HIGH | MEDIUM | LOW | INFO
- **CVSS**: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
- **Type**: SQL Injection | XSS | IDOR | etc.
- **Affected**: https://example.com/api/endpoint
- **Status**: Confirmed | Unconfirmed | Reported | Fixed
- **CVE**: CVE-YYYY-NNNNN (if applicable)
- **Evidence**: evidence/finding_001/
- **Description**: Brief description of the vulnerability
- **Steps to Reproduce**: Numbered reproduction steps
- **Impact**: What an attacker can achieve
- **Remediation**: How to fix it
- **Date Found**: YYYY-MM-DD
When a v7 hunt is active (hunt-state/ directory exists):
hunt-state/findings.json (canonical, JSON format matching Finding interface)hunt-state/reports/finding-{id}.mdhunt-state/evidence/Legacy storage (when no active hunt):
findings/FINDINGS_LOG.md or bug_bounty/<program>_bug_bounty/findings_log.mdfindings/<finding_id>.mdevidence/<finding_id>/When adding findings, check if hunt-state/findings.json exists first. If so, use the
structured JSON format (Finding interface from src/shared/hunt-types.ts).
After adding a finding:
provides/requires tags for chainingvulnerableprovides satisfies any existing gadget's requiresWhen a v7 hunt is active, also add gadgets to hunt-state/gadgets.json and update
hunt-state/coverage.json for the tested endpoint/vuln-class.
Delegate to report-worker (sonnet) for report generation, or handle locally for quick documentation.
| Severity | CVSS Range | Criteria | Examples |
|---|---|---|---|
| CRITICAL | 9.0-10.0 | RCE, full ATO, mass data breach, cloud takeover | Unauthenticated RCE, SSRF to IAM creds, SQL injection full DB |
| HIGH | 7.0-8.9 | Significant data access, auth bypass, priv esc | IDOR on PII, JWT forgery, CORS+exfil, OAuth token theft |
| MEDIUM | 4.0-6.9 | Limited exposure, needs user interaction | Stored XSS, CSRF on settings, standalone subdomain takeover |
| LOW | 0.1-3.9 | Minimal impact, informational | Reflected XSS unlikely context, version disclosure with no CVE |
| INFO | N/A | Informational, chain-only | Internal IPs in DNS, debug headers, CSP gaps |
DISCOVERED → CONFIRMED → CHAINED (optional) → REPORTED → SUBMITTED → RESOLVED/BOUNTY
↓ ↓ ↓
INVALID STALE DUPLICATE
(remove) (re-test) (note original)
| Status | Meaning | Next Action |
|---|---|---|
Discovered | Initial observation, needs validation | Run proof-validator |
Confirmed | PoC works, evidence captured | Check for chains, run dedup |
Chained | Part of a vulnerability chain | Write combined report |
Reported | H1 report written | Run validate-report, then submit |
Submitted | Submitted to HackerOne | Update submissions.json, wait for triage |
Resolved | Fixed by program | Note in findings_log, check for regression |
Bounty | Bounty awarded | Note amount in submissions.json |
Duplicate | Marked as dupe | Note original report ID |
Stale | No longer reproduces | Re-test or remove |
Invalid | False positive confirmed | Remove from active findings |
After completing this skill:
tested.json — record what was tested (asset + vuln class)gadgets.json — add any informational findings with provides/requires tags for chainingfindings_log.md — log any confirmed findings with severity