From pentest-framework
Tests target web apps for injection vulnerabilities like SQLi, XSS, SSTI, SSRF, LFI, command injection via active payloads after explicit user consent.
npx claudepluginhub sabania/pentest-cli --plugin pentest-frameworkThis skill is limited to using the following tools:
Test a target application for injection vulnerabilities including SQL injection, cross-site scripting (XSS), server-side template injection (SSTI), server-side request forgery (SSRF), and more.
Tests for injection vulnerabilities across all input vectors: SQL, NoSQL, OS Command, SSTI, XXE, and LDAP/XPath techniques.
Tests web apps for XSS and HTML injection vulnerabilities using payloads like script tags and event handlers, demos session hijacking, validates encoding. For authorized security audits.
Conducts OWASP-based penetration testing: reconnaissance, Top 10 vulnerabilities (access control, injection, misconfig), API security, PoCs, code remediations, reports. For security audits.
Share bugs, ideas, or general feedback.
Test a target application for injection vulnerabilities including SQL injection, cross-site scripting (XSS), server-side template injection (SSTI), server-side request forgery (SSRF), and more.
The target URL is provided via $ARGUMENTS. If no URL is provided, ask the user for one.
Parse the target URL from $ARGUMENTS.
WARN the user before proceeding:
WARNING: Active Testing Mode
This skill sends actual attack payloads to the target application. This includes SQL injection strings, XSS payloads, SSTI probes, and SSRF attempts.
- Only run this against applications you own or have explicit written authorization to test.
- These payloads may trigger WAF alerts, logging, or IDS/IPS notifications.
- Some payloads could potentially cause application errors or data corruption.
Do you want to proceed? (yes/no)
Wait for explicit user confirmation. Do NOT proceed without a clear "yes."
Delegate to injection-agent using the Agent tool. The agent must run all injection commands with --active --yes flags:
pentest -k -j -o ./findings inject sqli --active --yes <url>
pentest -k -j -o ./findings inject xss --active --yes <url>
pentest -k -j -o ./findings inject ssti --active --yes <url>
pentest -k -j -o ./findings inject ssrf --active --yes <url>
pentest -k -j -o ./findings inject cmdi --active --yes <url>
pentest -k -j -o ./findings inject lfi --active --yes <url>
pentest -k -j -o ./findings inject redirect --active --yes <url>
Read the JSON outputs from ./findings/ to gather all results.
Present confirmed vulnerabilities organized by severity:
--active flag enables payload delivery. The --yes flag skips interactive prompts.-k to skip SSL verification for targets with self-signed certs.-j for machine-readable JSON output.-o ./findings to persist results for later reporting.