Generate professional penetration testing reports following PTES/OWASP methodology from collected findings and evidence
From greyhatccnpx claudepluginhub overtimepog/greyhatcc --plugin greyhatccThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
You are executing the greyhatcc report writing skill.
/greyhatcc:report <target or engagement name>
{{ARGUMENTS}} is parsed automatically:
security) → used directly with H1 APINo format specification needed — detect and proceed.
Before executing this skill:
.greyhatcc/scope.json — verify target is in scope, note exclusions.greyhatcc/hunt-state.json — check active phase, resume contextfindings_log.md, tested.json, gadgets.json — avoid duplicating workBefore writing ANY report, also follow the context-loader protocol:
The report-writer agent MUST read these files before writing. Do NOT generate a report from memory or imagination. Every claim must be backed by evidence files.
Delegate to report-writer (sonnet) or report-writer-high (opus) for executive level.
1. Executive Summary (1-2 pages)
2. Key Findings Table
| # | Title | Severity | CVSS | CVE | Status | Asset |
|---|-------|----------|------|-----|--------|-------|
| 1 | RCE via deserialization | CRITICAL | 9.8 | CVE-2024-XXXX | Confirmed | api.target.com |
| 2 | IDOR on user profiles | HIGH | 7.5 | N/A | Confirmed | app.target.com |
3. Target Identification
4. Exploited Vulnerabilities (per finding)
5. Post-Exploitation Activities
6. Security Controls Observed
7. Attack Scenarios & Vulnerability Chains
8. Recommendations (prioritized)
CRITICAL Priority (fix within 24-48 hours):
- [specific remediation with code examples]
HIGH Priority (fix within 1 week):
- [specific remediation with code examples]
MEDIUM Priority (fix within 1 month):
- [specific remediation with code examples]
LOW Priority (fix in next release cycle):
- [specific remediation]
9. Methodology
10. Appendices
| Rating | Criteria | Examples |
|---|---|---|
| CRITICAL (9.0-10.0) | RCE, full ATO, mass data breach, cloud takeover | Unauthenticated RCE, SQL injection with full DB access, SSRF to IAM creds |
| HIGH (7.0-8.9) | Significant data exposure, auth bypass, privilege escalation | IDOR on PII, JWT forgery, CORS with data exfil, OAuth token theft |
| MEDIUM (4.0-6.9) | Limited data exposure, requires user interaction, limited impact | Stored XSS, CSRF on settings, subdomain takeover (standalone), info disclosure |
| LOW (0.1-3.9) | Minimal impact, theoretical, informational | Reflected XSS requiring unlikely user action, missing headers (if not excluded), version disclosure |
Use /greyhatcc:h1-report for HackerOne-specific formatting.
findings/FINDINGS_LOG.md - All documented findingsrecon/ - Reconnaissance dataevidence/ - Screenshots, HTTP logs, response dumpsexploits/ - PoC codeSave to reports/pentest_report_<target>.md or reports/h1_report_<finding>.md
After completing this skill:
tested.json — record what was tested (asset + vuln class)gadgets.json — add any informational findings with provides/requires tags for chainingfindings_log.md — log any confirmed findings with severity