From wooyun-legacy
Provides web vulnerability testing methodology from 88,636 WooYun cases for penetration testing, security audits, code reviews, and research. Covers SQLi, XSS, RCE, file upload, path traversal, unauthorized access.
npx claudepluginhub trailofbits/skills-curated --plugin wooyun-legacyThis skill is limited to using the following tools:
Methodology and testing patterns extracted from 88,636 real-world
references/bank-penetration.mdreferences/checklists/command-execution-checklist.mdreferences/checklists/csrf-checklist.mdreferences/checklists/file-upload-checklist.mdreferences/checklists/info-disclosure-checklist.mdreferences/checklists/logic-flaws-checklist.mdreferences/checklists/misconfig-checklist.mdreferences/checklists/path-traversal-checklist.mdreferences/checklists/rce-checklist.mdreferences/checklists/sql-injection-checklist.mdreferences/checklists/ssrf-checklist.mdreferences/checklists/unauthorized-access-checklist.mdreferences/checklists/weak-password-checklist.mdreferences/checklists/xss-checklist.mdreferences/checklists/xxe-checklist.mdreferences/command-execution.mdreferences/file-upload.mdreferences/info-disclosure.mdreferences/logic-flaws.mdreferences/path-traversal.mdConducts multi-round deep research on GitHub repos via API and web searches, generating markdown reports with executive summaries, timelines, metrics, and Mermaid diagrams.
Dynamically discovers and combines enabled skills into cohesive, unexpected delightful experiences like interactive HTML or themed artifacts. Activates on 'surprise me', inspiration, or boredom cues.
Generates images from structured JSON prompts via Python script execution. Supports reference images and aspect ratios for characters, scenes, products, visuals.
Methodology and testing patterns extracted from 88,636 real-world vulnerability cases reported to the WooYun platform (2010-2016).
All testing described here must be performed only against systems you have written authorization to test.
These shortcuts lead to missed findings. Reject them:
Vulnerability = Expected Behavior - Actual Behavior
= Developer Assumptions + Attacker Input -> Unexpected State
Analysis chain:
1. Where does data come from? (Input sources)
-> GET/POST/Cookie/Header/File/WebSocket
2. Where does data flow? (Data path)
-> Validation -> Processing -> Storage -> Output
3. Where is data trusted? (Trust boundaries)
-> Client / Server / Database / OS / External service
4. How is data processed? (Processing logic)
-> Filter / Escape / Validate / Execute
5. Where does data end up? (Output sinks)
-> HTML / SQL / Shell / Filesystem / Log / Email
+-------------------------------------------+
| Application Attack Surface |
+-------------------------------------------+
|
+-----------------------+-----------------------+
| | |
+----v----+ +-----v-----+ +-----v-----+
| Input | | Processing| | Output |
+---------+ +-----------+ +-----------+
| GET | | Input | | HTML page |
| POST | -> | validation| -> | JSON resp |
| Cookie | | Biz logic | | File DL |
| Headers | | DB query | | Error msg |
| File | | File op | | Log entry |
| Upload | | Sys call | | Email |
+---------+ +-----------+ +-----------+
Cases: 27,732 | Reference: sql-injection.md | Checklist: sql-injection-checklist.md
High-risk parameters: id, sort_id, username, password, search,
keyword, page, order, cat_id
Injection point detection:
' " ) ') ") -- # /*@@version (MSSQL), version() (MySQL),
v$version (Oracle)Bypass techniques:
/**/ %09 %0a ()SeLeCt sel%00ect /*!select*/LIKE REGEXP BETWEEN IN0x hex, char(), concat()Core defense: parameterized queries (PreparedStatement / ORM binding).
Cases: 7,532 | Reference: xss.md | Checklist: xss-checklist.md
Output points: user profile fields (nickname, bio), search reflections, file metadata (filename, alt text), email content (subject, body)
Bypass techniques:
<ScRiPt> <script/x> <script\n>onerror onload onmouseover onfocusjavascript: data: vbscript:Core defense: context-aware output encoding + Content Security Policy.
Cases: 6,826 | Reference: command-execution.md | Checklist: command-execution-checklist.md
Entry points: system command wrappers (ping, traceroute, nslookup),
file operations (compress, decompress, image processing), code eval
(eval, assert, preg_replace(/e)), framework vulnerabilities
(Struts2, WebLogic, JBoss)
Command chaining:
; | || && \ $()`& | || &&Bypass techniques:
${IFS} $IFS$9 %09 < <>ca\t ca''t c$@at /???/??t$(printf "\x63\x61\x74"),
`echo Y2F0|base64 -d`Core defense: avoid shell invocation; use execFile over exec,
allowlist acceptable inputs.
Cases: 2,711 | Reference: file-upload.md | Checklist: file-upload-checklist.md
Bypass detection:
image/gif header + PHP code body.php5 .phtml .pht .php. .php::$DATAGIF89a + <?php or image-based webshell/upload/1.asp;.jpg (IIS 6.0)Parser-specific vulnerabilities:
/test.asp/1.jpg, test.asp;.jpg.php.xxx (unknown extension fallback)/1.jpg/1.php (cgi.fix_pathinfo)test.jsp%00.jpgCore defense: allowlist extensions, rename uploads, store outside webroot, validate content type server-side.
Cases: 2,854 | Reference: path-traversal.md | Checklist: path-traversal-checklist.md
High-risk parameters: file, path, filename, url, dir,
template, page, include, download
Traversal payloads:
../../../etc/passwd%2e%2e%2f, ..%252f, %c0%ae%c0%ae/../../../etc/passwd%00.jpg..\..\..\windows\win.iniTarget files (Linux): /etc/passwd, /etc/shadow,
/proc/self/environ, /var/log/apache2/access.log
Core defense: resolve canonical paths, validate against allowlisted directories, never use user input in file paths directly.
Cases: 14,377 | Reference: unauthorized-access.md | Checklist: unauthorized-access-checklist.md
Access types:
/admin, /manager, /consoleCore defense: authentication + authorization on every endpoint, session management, principle of least privilege.
Cases: 7,337 | Reference: info-disclosure.md | Checklist: info-disclosure-checklist.md
Disclosure sources: error messages with stack traces, exposed .git
or .svn directories, backup files (.bak, .sql, .tar.gz),
configuration files, debug endpoints, directory listings
Core defense: custom error pages, disable directory listing, remove debug endpoints in production, audit publicly accessible files.
Cases: 8,292 | Reference: logic-flaws.md | Checklist: logic-flaws-checklist.md
Vulnerability patterns:
Testing approach:
Core defense: server-side validation of all business-critical logic.
These categories are derived from case data without full reference documents. Each has a testing checklist extracted from real cases.
| Category | Checklist |
|---|---|
| CSRF | csrf-checklist.md |
| SSRF | ssrf-checklist.md |
| Weak Passwords | weak-password-checklist.md |
| Misconfiguration | misconfig-checklist.md |
| Remote Code Execution | rce-checklist.md |
| XML External Entity (XXE) | xxe-checklist.md |
Note: The RCE checklist covers deserialization, OGNL injection, and framework-specific remote code execution — distinct from the OS command injection focus of the Command Execution reference above.
Real-world penetration testing methodology examples (anonymized):
| Case Study | Description |
|---|---|
| bank-penetration.md | Multi-stage attack chain against a financial institution |
| telecom-penetration.md | Infrastructure penetration of a telecom carrier |
These demonstrate how individual vulnerabilities chain together into full compromise scenarios.
| Vulnerability | Core Defense | Implementation |
|---|---|---|
| SQL Injection | Parameterized queries | PreparedStatement / ORM |
| XSS | Output encoding | Context-aware escaping + CSP |
| Command Execution | Avoid shell | execFile not exec, allowlist |
| File Upload | Strict validation | Allowlist ext, rename, isolate |
| Path Traversal | Canonical paths | Resolve + validate against allowlist |
| Unauthorized Access | Access control | AuthN + AuthZ + session mgmt |
| Logic Flaws | Server-side checks | Validate all business logic server-side |
| Info Disclosure | Minimize exposure | Custom errors, no debug in prod |
All 88,636 vulnerabilities in this database share a common root cause: the gap between what developers assumed and what attackers actually provided. Effective security testing means systematically challenging every assumption at every trust boundary.
Four principles from the data: