From pentest-framework
Tests authentication and session security in web apps: JWT algorithm issues, OAuth misconfigs, session cookie flags, brute force resistance. Passive analysis auto-runs; active needs consent.
npx claudepluginhub sabania/pentest-cli --plugin pentest-frameworkThis skill is limited to using the following tools:
Test a target application's authentication mechanisms including JWT token security, OAuth implementation, session management, and brute force resistance.
Tests API authentication for OWASP API2:2023 Broken Authentication issues like JWT flaws, missing endpoint protection, token leakage, weak passwords, and session weaknesses.
Tests API authentication mechanisms for weaknesses like broken JWT validation, missing endpoint auth, weak passwords, credential stuffing, token leakage, and session flaws. Maps to OWASP API2:2023.
Identifies and tests broken authentication vulnerabilities in web apps including password policies, session management, credential enumeration, MFA, and token handling like JWT/OAuth. For OWASP Top 10 audits.
Share bugs, ideas, or general feedback.
Test a target application's authentication mechanisms including JWT token security, OAuth implementation, session management, and brute force resistance.
The target URL is provided via $ARGUMENTS. If no URL is provided, ask the user for one.
Parse the target URL from $ARGUMENTS.
Delegate to auth-agent using the Agent tool. The agent performs the following:
Phase 1 — Passive Analysis (no consent needed):
pentest -k -j -o ./findings auth jwt <url>
pentest -k -j -o ./findings auth oauth <url>
pentest -k -j -o ./findings auth session <url>
./findings/ for bundle results), extract and analyze them for:
Phase 2 — Active Testing (requires explicit consent):
Before running brute force tests, ask the user:
Brute force testing will send multiple login attempts to the target. This may lock out accounts or trigger rate limiting. Do you want to proceed? (yes/no)
If the user consents:
pentest -k -j -o ./findings auth brute --active --yes <url>
Read the JSON outputs from ./findings/ to gather all results.
Present findings covering:
-k to skip SSL verification for targets with self-signed certs.-j for machine-readable JSON output.-o ./findings to persist results for later reporting.