CtrlK
BlogDocsLog inGet started
Tessl Logo

Burp Suite Web Application Testing

This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater", "analyze HTTP history", or "configure proxy for web testing". It provides comprehensive guidance for using Burp Suite's core features for web application security testing.

Invalid
This skill can't be scored yet
Validation errors are blocking scoring. Review and fix them to unlock Quality, Impact and Security scores. See what needs fixing →
SKILL.md
Quality
Evals
Security

Security

2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.

Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly requires navigating to and intercepting HTTP traffic from arbitrary target web application URLs and analyzing responses (see Phase 1 "Navigate to target URL in browser" / Proxy > Intercept, Phase 5 "Enter target URL in URLs to scan", and sending requests from HTTP history to Repeater/Intruder), so it ingests untrusted third‑party web content that can materially influence subsequent actions.

Report incorrect finding
Medium

W013: Attempt to modify system services in skill instructions

What this means

The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.

Why it was flagged

Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill explicitly directs installing Burp's CA into the browser/system trusted roots and configuring proxy-based HTTPS interception, which modifies system/trust state and can bypass TLS protections (a security-sensitive change that may require elevated privileges).

Repository
duclm1x1/Dive-Ai
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.