From communitytools
Automates HackerOne bug bounty workflows: parses scope CSVs, deploys parallel pentesting agents per asset, validates PoCs with poc.py and output, generates submission reports. Use for HackerOne program testing.
npx claudepluginhub transilienceai/communitytoolsThis skill uses the workspace's default tool permissions.
Automates HackerOne workflows: scope parsing → parallel testing → PoC validation → submission reports.
Triages HackenProof bug bounty reports: validates scope, commit/version, PoC evidence, duplicates; assigns severity, state, labels, and comments.
Bulk triages open reports across assigned HackenProof programs: discovers reports via API, syncs local git repos, analyzes each, outputs structured recommendations for human review.
Orchestrates penetration testing workflow by spawning executor and validator agents, managing attack-chain.md, experiments.md, recon, and validation for security engagements.
Share bugs, ideas, or general feedback.
Automates HackerOne workflows: scope parsing → parallel testing → PoC validation → submission reports.
1. Input: HackerOne program URL or CSV file
2. Parse scope and program guidelines
3. Deploy Pentester agents in parallel (one per asset)
4. Validate PoCs (poc.py + poc_output.txt required)
5. Generate HackerOne-formatted reports
Option 1: HackerOne URL
- [ ] Fetch program data and guidelines
- [ ] Download scope CSV
- [ ] Parse eligible assets
- [ ] Deploy agents in parallel
- [ ] Validate PoCs
- [ ] Generate submissions
Option 2: CSV File
- [ ] Parse CSV scope file
- [ ] Extract eligible_for_submission=true assets
- [ ] Collect program guidelines
- [ ] Deploy agents
- [ ] Validate and generate reports
Expected columns:
identifier - Asset URL/domainasset_type - URL, WILDCARD, API, CIDReligible_for_submission - Must be "true"max_severity - critical, high, medium, lowinstruction - Asset-specific notesUse tools/csv_parser.py to parse.
Coordinator per asset — spawned inline using role prompts:
coordinator_role = Read("skills/coordination/SKILL.md")
Agent(prompt=f"{coordinator_role}\n\nTARGET: {asset_url}\nSCOPE: {program_guidelines}\nOUTPUT_DIR: ...",
run_in_background=True)
Parallel Execution:
skills/coordination/reference/executor-role.mdEvery finding MUST have:
poc.py - Executable exploit scriptpoc_output.txt - Timestamped execution proofworkflow.md - Manual steps (if applicable)Experimentation: Test edge cases, verify impact, document failures.
Required sections (HackerOne standard):
Use tools/report_validator.py to validate.
Per OUTPUT.md - Bug Bounty format:
{OUTPUT_DIR}/
├── findings/
│ ├── finding-001/
│ │ ├── report.md # HackerOne report
│ │ ├── poc.py # Validated PoC
│ │ ├── poc_output.txt # Proof
│ │ └── workflow.md # Manual steps
├── reports/
│ ├── submissions/
│ │ ├── H1_CRITICAL_001.md # Ready to submit
│ │ └── H1_HIGH_001.md
│ └── SUBMISSION_GUIDE.md
└── evidence/
├── screenshots/
└── http-logs/
High-Value:
Avoid:
MUST DO:
eligible_for_submission=true assetsNEVER:
Before submission:
tools/csv_parser.py - Parse HackerOne scope CSVstools/report_validator.py - Validate report completenessskills/coordination/SKILL.md — Coordinator skill (spawns executors/validators)Uses skills/coordination/SKILL.md for coordination workflow. Follows OUTPUT.md for submission format.
Out of Scope: Check eligible_for_submission=true
Cannot Reproduce: Validate PoC, include poc_output.txt
Duplicate: Search disclosed reports, submit quickly
Insufficient Impact: Show realistic attack scenario
/hackerone <program_url_or_csv_path>