This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session management security", "perform credential stuffing tests", "evaluate password policies", "test for session fixation", or "identify authentication bypass flaws". It provides comprehensive techniques for identifying authentication and session management weaknesses in web applications.
Security
3 findings — 1 critical severity, 1 high severity, 1 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected high-risk code patterns in the skill content — including its prompts, tool definitions, and resources — such as data exfiltration, backdoors, remote code execution, credential theft, system compromise, supply chain attacks, and obfuscation techniques.
Malicious code pattern detected (high risk: 0.90). The content explicitly instructs how to perform credential theft (brute force and credential stuffing), evade detection (IP rotation, forged headers, user‑agent randomization), and abuse flows such as host-header injection to redirect password reset emails and MFA/OTP bypass techniques, which are high-risk malicious behaviors despite being framed as authorized testing guidance.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). This skill repeatedly instructs constructing requests, commands, and code that include plaintext credentials, session cookies, tokens, and reset tokens (e.g., username/password in POST bodies, Cookie: SESSIONID=..., Authorization: Bearer ...), which requires the agent to handle or emit secret values verbatim.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 1.00). The SKILL.md core workflow explicitly instructs the agent to fetch and analyze responses from arbitrary target websites (e.g., requests to https://target.com/login and session cookie collection in Phase 1/6, username-enumeration API responses in Phase 3) and to ingest public breached datasets (e.g., "Have I Been Pwned") — untrusted third‑party content that the agent must interpret to decide subsequent test actions.
20ba150
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.