This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test REST API", "test GraphQL", "API penetration testing", "bug bounty API testing", or needs guidance on API security assessment techniques.
Security
2 findings — 1 critical severity, 1 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected high-risk code patterns in the skill content — including its prompts, tool definitions, and resources — such as data exfiltration, backdoors, remote code execution, credential theft, system compromise, supply chain attacks, and obfuscation techniques.
Malicious code pattern detected (high risk: 1.00). The content is a high-risk offensive guide: it contains explicit instructions for data exfiltration (e.g., iplogger and SMB OOB exfiltration), credential theft and brute-force techniques, command/SQL/XXE/SSRF exploitation that enable remote code execution and unauthorized access, and evasion methods (rate‑limit bypass, IP rotation) — all indicative of deliberate malicious/abusive use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.80). The skill's Core Workflow explicitly instructs fetching and parsing OpenAPI/Swagger files (e.g., /swagger.json, /openapi.json) and checking archive.org snapshots to extract paths and drive fuzzing, meaning the agent would ingest untrusted public third-party content (target-hosted docs and archive.org) that can materially influence subsequent tool actions.
20ba150
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.