WebAssessment
danielmiessler
Web security assessment. USE WHEN web assessment, pentest, security testing, vulnerability scan. SkillSearch('webassessment') for docs.
bunx add-skill danielmiessler/personal_ai_infrastructure -s WebAssessmentLoadingβ¦
danielmiessler
Web security assessment. USE WHEN web assessment, pentest, security testing, vulnerability scan. SkillSearch('webassessment') for docs.
bunx add-skill danielmiessler/personal_ai_infrastructure -s WebAssessmentLoadingβ¦
Before executing, check for user customizations at:
~/.claude/skills/CORE/USER/SKILLCUSTOMIZATIONS/WebAssessment/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
You MUST send this notification BEFORE doing anything else when this skill is invoked.
Send voice notification:
curl -s -X POST http://localhost:8888/notify \
-H "Content-Type: application/json" \
-d '{"message": "Running the WORKFLOWNAME workflow in the WebAssessment skill to ACTION"}' \
> /dev/null 2>&1 &
Output text notification:
Running the **WorkflowName** workflow in the **WebAssessment** skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
Security assessment infrastructure integrating reconnaissance, threat modeling, and vulnerability testing.
| Trigger | Workflow |
|---|---|
| "understand application", "what does this app do", "map the application" | UnderstandApplication |
| "threat model", "attack scenarios", "how would I attack" | CreateThreatModel |
| "pentest", "security assessment", "test for vulnerabilities" | Pentest/MasterMethodology |
| "fuzz with ffuf", "directory fuzzing", "content discovery" | Ffuf/FfufGuide |
| "OSINT", "reconnaissance", "open source intelligence" | Osint/MasterGuide |
| "test web app", "Playwright", "browser automation" | Webapp/TestingGuide |
| "bug bounty", "bounty programs" | BugBounty/Programs |
| "vulnerability analysis with AI", "Gemini analysis" | VulnerabilityAnalysisGemini3 |
WebAssessment coordinates with specialized skills:
| Phase | Skill | Purpose |
|---|---|---|
| Scope Definition | Recon | Corporate structure, domain enumeration |
| Target Discovery | Recon | Subdomains, endpoints, ports |
| Understanding | WebAssessment | App narrative, user flows, sensitive data |
| Threat Modeling | WebAssessment | Attack scenarios, test prioritization |
| Injection Testing | PromptInjection | LLM-specific attacks |
| Intelligence | OSINT | People, companies, social media |
1. Corporate Structure (Recon) β Define scope and targets
2. Subdomain Enumeration (Recon) β Find all domains
3. Endpoint Discovery (Recon) β Extract JS endpoints
4. Understand Application β Build app narrative
5. Create Threat Model β Prioritize attack scenarios
6. Execute Testing β Test against identified threats
7. Report Findings β Document with PoCs
WebAssessment uses tools from the Recon skill:
# Corporate structure for scope
bun ~/.claude/skills/Recon/Tools/CorporateStructure.ts target.com
# Subdomain enumeration
bun ~/.claude/skills/Recon/Tools/SubdomainEnum.ts target.com
# Endpoint discovery from JavaScript
bun ~/.claude/skills/Recon/Tools/EndpointDiscovery.ts https://target.com
# Port scanning
bun ~/.claude/skills/Recon/Tools/PortScan.ts target.com
# Path discovery
bun ~/.claude/skills/Recon/Tools/PathDiscovery.ts https://target.com
Produces structured narrative including:
Generates prioritized attack plan:
| Category | Triggers On |
|---|---|
| Authentication | Auth mechanisms detected |
| Access Control | Multiple user roles |
| Injection | All web apps |
| Data Exposure | Sensitive data identified |
| File Upload | Upload functionality |
| API Security | API endpoints |
| WebSocket | WebSocket detected |
| Business Logic | All web apps |
| Payment Security | Payment flows |
Phase 0: Scoping & Preparation Phase 1: Reconnaissance (Recon skill) Phase 2: Mapping (content discovery) Phase 3: Vulnerability Analysis Phase 4: Exploitation Phase 5: Reporting
Core Assessment:
Workflows/UnderstandApplication.md - Application reconnaissanceWorkflows/CreateThreatModel.md - Attack scenario generationPenetration Testing:
Workflows/Pentest/MasterMethodology.md - 6-phase methodologyWorkflows/Pentest/ToolInventory.md - Security tools referenceWorkflows/Pentest/Reconnaissance.md - Asset discoveryWorkflows/Pentest/Exploitation.md - Vulnerability testingWeb Fuzzing:
Workflows/Ffuf/FfufGuide.md - FFUF fuzzing guideWorkflows/Ffuf/FfufHelper.md - Automated fuzzing helperBug Bounty:
Workflows/BugBounty/Programs.md - Program trackingWorkflows/BugBounty/AutomationTool.md - Bounty automationWeb App Testing:
Workflows/Webapp/TestingGuide.md - Playwright testingWorkflows/Webapp/Examples.md - Testing patternsOSINT:
Workflows/Osint/MasterGuide.md - OSINT methodologyWorkflows/Osint/Reconnaissance.md - Domain reconWorkflows/Osint/SocialMediaIntel.md - SOCMINTWorkflows/Osint/Automation.md - SpiderFoot/MaltegoWorkflows/Osint/MetadataAnalysis.md - ExifTool analysisAI-Powered:
Workflows/VulnerabilityAnalysisGemini3.md - Gemini deep analysisExample 1: Full assessment workflow
User: "Security assessment on app.example.com"
β Run UnderstandApplication to build narrative
β Run CreateThreatModel to prioritize testing
β Follow MasterMethodology with threat model guidance
β Report findings with OWASP/CWE references
Example 2: Quick threat model
User: "How would I attack this app?"
β Run CreateThreatModel on target
β Get prioritized attack paths
β Get test plan with tool suggestions
Example 3: Integrate with Recon
User: "Assessment on target.com including all subdomains"
β CorporateStructure (Recon) β Find parent/child companies
β SubdomainEnum (Recon) β Find all subdomains
β EndpointDiscovery (Recon) β Extract JS endpoints
β UnderstandApplication β Build app narrative
β CreateThreatModel β Generate attack plan
Use when you need to run Flow type checking, or when seeing Flow type errors in React code.
Use when you want to validate changes before committing, or when you need to check all React contribution requirements.
Use when feature flag tests fail, flags need updating, understanding @gate pragmas, debugging channel-specific test failures, or adding new flags to React.
Use when you need to check feature flag states, compare channels, or debug why a feature behaves differently across release channels.