From security-research
Gather open-source intelligence about a target project by searching official documentation, GitHub repositories, API references, deployment guides, and public security advisories. Enriches CVE findings with PoC exploits from the local PoC-in-GitHub database. Use during Phase 1 reconnaissance to build project understanding before source code analysis. Outputs a structured web_intelligence.md file to the audit workspace.
npx claudepluginhub pucagit/claude-plugin --plugin security-researchThis skill uses the workspace's default tool permissions.
Gather OSINT for: `$ARGUMENTS`
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
Gather OSINT for: $ARGUMENTS
Parse the arguments:
frappe, keycloak, zabbix)https://frappeframework.com or https://github.com/frappe/frappe)./recon/web_intelligence.mdOutput file: {AUDIT_DIR}/recon/web_intelligence.md
Search for the project's canonical sources:
WebSearch: "{TARGET_NAME} official documentation site"
WebSearch: "{TARGET_NAME} github repository"
WebSearch: "{TARGET_NAME} architecture overview"
From the results, identify and record:
If a GitHub repo is found (https://github.com/{owner}/{repo}), fetch these in order:
| URL | Purpose |
|---|---|
https://raw.githubusercontent.com/{owner}/{repo}/main/README.md | Project overview, setup, key features |
https://raw.githubusercontent.com/{owner}/{repo}/main/SECURITY.md | Security policy, reporting contacts, supported versions |
https://raw.githubusercontent.com/{owner}/{repo}/main/CHANGELOG.md (or CHANGES.md, HISTORY.md) | Recent changes, security fixes |
https://api.github.com/repos/{owner}/{repo}/releases?per_page=5 | Latest releases and release notes |
https://github.com/{owner}/{repo}/security/advisories | Published security advisories (fetch page) |
Also search:
WebSearch: "site:github.com/{owner}/{repo} security advisory"
WebSearch: "{TARGET_NAME} CVE site:cve.mitre.org OR site:nvd.nist.gov"
WebSearch: "{TARGET_NAME} vulnerability disclosed site:hackerone.com OR site:bugcrowd.com"
Extract from GitHub results:
Search and fetch the most relevant architecture docs:
WebSearch: "{TARGET_NAME} architecture documentation"
WebSearch: "{TARGET_NAME} system design components"
WebSearch: "{TARGET_NAME} technical overview how it works"
Fetch the top 2–3 most relevant pages. Extract:
WebSearch: "{TARGET_NAME} REST API documentation"
WebSearch: "{TARGET_NAME} API reference endpoints"
WebSearch: "{TARGET_NAME} OpenAPI swagger spec"
Fetch the top result. Extract:
WebSearch: "{TARGET_NAME} deployment guide installation"
WebSearch: "{TARGET_NAME} configuration reference security settings"
WebSearch: "{TARGET_NAME} production hardening"
Fetch top 1–2 results. Extract:
WebSearch: "{TARGET_NAME} authentication authorization documentation"
WebSearch: "{TARGET_NAME} user roles permissions"
WebSearch: "{TARGET_NAME} SSO OAuth SAML integration"
Fetch top 1–2 results. Extract:
WebSearch: "{TARGET_NAME} CVE security vulnerability 2023 2024 2025 2026"
WebSearch: "{TARGET_NAME} security advisory patch"
WebSearch: "{TARGET_NAME} bug bounty report disclosed"
Fetch top CVE or advisory pages. Extract:
Collect all CVE IDs found in this step for the PoC lookup in Step 8.
For every CVE ID collected from Steps 2 and 7, look up available proof-of-concept exploits from the local PoC-in-GitHub database.
For each CVE ID:
# The lookup script is co-located with this skill file
bash SKILL_DIR/lookup-poc.sh <CVE-ID> --top 3 --json
Use the absolute path to the script based on the plugin location. The script:
~/cve/PoC-in-GitHub exists (clones if missing)git pullFor each PoC result with html_url:
{html_url}https://raw.githubusercontent.com/{full_name}/main/README.md (try master if main fails)Skip PoC lookup if:
Write {AUDIT_DIR}/recon/web_intelligence.md with this structure:
# Web Intelligence: {TARGET_NAME}
> Generated from open-source research. All claims cite their source URL.
## Project Overview
- **Type**: [web app / auth service / framework / platform / etc.]
- **Language**: [primary language(s)]
- **GitHub**: [url]
- **Official Docs**: [url]
- **License**: [license]
- **Latest Stable Version**: [version] (released [date])
- **Actively Maintained**: [yes/no — basis for assessment]
## Architecture Summary
[Component description: what the major modules/services are and how they relate.
Describe the request lifecycle if documented.]
| Component | Role | Notes |
|---|---|---|
| [component] | [what it does] | [security notes] |
## API Surface
- **Auth mechanism**: [how APIs are authenticated]
- **Base path**: [e.g., `/api/v1/`]
- **Notable endpoint categories**: [admin, public, webhooks, etc.]
- **OpenAPI/Swagger available**: [yes/no + URL if yes]
- **Rate limiting**: [present/absent/unknown]
## Deployment & Configuration
| Setting | Default | Security Impact |
|---|---|---|
| [env var / config key] | [default value] | [what happens if misconfigured] |
**Default credentials**: [any defaults noted in docs — CRITICAL if exists]
**Debug flags**: [any debug/dev mode settings with security implications]
**Exposed services**: [ports, admin interfaces]
## Authentication & Authorization Model
- **Auth type**: [session / JWT / API key / OAuth / etc.]
- **Role model**: [RBAC / ABAC / custom]
- **Privilege levels**: [list with what each can do]
- **Multi-tenancy**: [how tenant isolation works, if applicable]
- **Notable auth behaviors**: [anything unusual or security-relevant]
## Known Vulnerabilities
| CVE | Severity | Affected Versions | Vuln Class | Patched |
|---|---|---|---|---|
| [CVE-XXXX-XXXXX] | [HIGH] | [≤ X.Y.Z] | [SSTI / SQLi / etc.] | [yes/no] |
**Recurring vulnerability classes**: [patterns that appear multiple times in history]
**Public disclosures**: [any notable bug bounty reports or advisories]
## Available PoC Exploits
[For each CVE with PoCs found via lookup-poc.sh:]
### CVE-YYYY-NNNNN: [Title/Description]
| Repository | Stars | Type | Quality |
|---|---|---|---|
| [{full_name}]({html_url}) | {stars} | [exploit/scanner/both] | [High/Medium/Low] |
**Best PoC**: [{full_name}]({html_url})
- **Exploit type**: [RCE / SQLi / auth bypass / etc.]
- **Affected versions**: [from PoC README]
- **Usage**: [brief description of how to use]
- **Applicability to target**: [Applicable / Not applicable / Unknown]
- Target version: [X.Y.Z] vs affected: [≤ A.B.C]
- Vulnerable component present: [yes/no/unknown]
- Prerequisites: [specific config, exposed endpoint, etc.]
## Security-Relevant Observations
[Anything from the documentation that stands out as security-relevant:
- Features that handle user-controlled templates, file uploads, webhooks, etc.
- Admin interfaces or debug endpoints
- Experimental features that may have weaker security guarantees
- Integration points with external systems]
## Sources
| Source | URL | Retrieved |
|---|---|---|
| Official Docs | [url] | [today's date] |
| GitHub README | [url] | [today's date] |
| CVE Reference | [url] | [today's date] |
| PoC Database | ~/cve/PoC-in-GitHub | [today's date] |
Confirm: "Wrote web_intelligence.md ({N} lines). Key findings: {2–3 line summary of most important security-relevant facts}. Found {N} CVEs with {M} available PoC repositories."