This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater", "analyze HTTP history", or "configure proxy for web testing". It provides comprehensive guidance for using Burp Suite's core features for web application security testing.
Security
2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly requires navigating to and intercepting HTTP traffic from arbitrary target web application URLs and analyzing responses (see Phase 1 "Navigate to target URL in browser" / Proxy > Intercept, Phase 5 "Enter target URL in URLs to scan", and sending requests from HTTP history to Repeater/Intruder), so it ingests untrusted third‑party web content that can materially influence subsequent actions.
The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.
Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill explicitly directs installing Burp's CA into the browser/system trusted roots and configuring proxy-based HTTPS interception, which modifies system/trust state and can bypass TLS protections (a security-sensitive change that may require elevated privileges).
20ba150
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.