From pentest-framework
Tests cloud infrastructure for storage misconfigurations (S3, Azure Blob, GCS, Firebase), WAF detection (Cloudflare, AWS WAF), and email security (SPF, DKIM, DMARC). Useful for identifying passive cloud risks.
npx claudepluginhub sabania/pentest-cli --plugin pentest-frameworkThis skill is limited to using the following tools:
Test a target application's cloud infrastructure for storage misconfigurations, WAF presence, and email security (SPF, DKIM, DMARC).
Tests cloud (AWS, Azure, GCP) and container (Docker, Kubernetes) environments for security misconfigurations and exploitation paths. Use for cloud/container security audits.
Guides authorized penetration testing of AWS, Azure, GCP cloud environments using shared responsibility model, tools like Pacu/ScoutSuite, IAM exploits, SSRF attacks, and MITRE ATT&CK reporting.
Audits IaC templates (Terraform/CloudFormation), app configs, Docker/Kubernetes manifests, and web server settings for security misconfigurations per OWASP and CIS benchmarks.
Share bugs, ideas, or general feedback.
Test a target application's cloud infrastructure for storage misconfigurations, WAF presence, and email security (SPF, DKIM, DMARC).
The target URL is provided via $ARGUMENTS. If no URL is provided, ask the user for one.
Parse the target URL from $ARGUMENTS.
Delegate to cloud-agent using the Agent tool. The agent must run the following commands, collecting all JSON output:
pentest -k -j -o ./findings cloud storage <url>
pentest -k -j -o ./findings cloud waf <url>
pentest -k -j -o ./findings cloud email <url>
Read the JSON outputs from ./findings/ to gather all results.
Report cloud-specific findings covering:
For each finding, include:
-k to skip SSL verification for targets with self-signed certs.-j for machine-readable JSON output.-o ./findings to persist results for later reporting.