This skill enables automated penetration testing of web applications. It uses the penetration-tester plugin to identify vulnerabilities, including OWASP Top 10 threats, and suggests exploitation techniques. Use this skill when the user requests a "penetration test", "pentest", "vulnerability assessment", or asks to "exploit" a web application. It provides comprehensive reporting on identified security flaws.
Install with Tessl CLI
npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill performing-penetration-testing86
Quality
48%
Does it follow best practices?
Impact
90%
1.00xAverage score across 12 eval scenarios
Optimize this skill with Tessl
npx tessl skill review --optimize ./backups/skills-migration-20251108-070147/plugins/security/penetration-tester/skills/penetration-tester/SKILL.mdPentest report structure and content
Risk ratings present
100%
100%
Remediation recommendations
100%
100%
SQL injection coverage
100%
100%
XSS coverage
100%
100%
CSRF coverage
100%
100%
OWASP framework reference
100%
100%
Scope documentation
100%
100%
Authorization statement
100%
100%
Executive summary
100%
100%
Structured sections
100%
100%
Without context: $0.2790 · 1m 57s · 10 turns · 14 in / 6,295 out tokens
With context: $0.4825 · 2m 26s · 21 turns · 29 in / 7,654 out tokens
Engagement planning and authorization
Authorization requirement
100%
100%
Scope boundaries defined
100%
100%
Safe exploitation approach
100%
100%
Target identification step
100%
100%
OWASP Top 10 methodology
100%
100%
Vulnerability tracking integration
30%
10%
Authentication and authorization testing
100%
100%
Reporting deliverable
100%
100%
Without context: $0.3106 · 2m 19s · 11 turns · 18 in / 6,728 out tokens
With context: $0.5024 · 2m 53s · 22 turns · 174 in / 8,224 out tokens
API security assessment reporting
Authentication bypass coverage
58%
100%
Authorization issues coverage
100%
100%
Remediation per finding
100%
100%
OWASP framework used
100%
100%
Risk ratings assigned
100%
100%
Injection attack coverage
100%
100%
Authorization confirmation
100%
100%
Vulnerability tracking mention
0%
0%
Scope definition
100%
100%
Without context: $0.2737 · 1m 34s · 12 turns · 19 in / 4,711 out tokens
With context: $0.4885 · 2m 29s · 22 turns · 28 in / 7,595 out tokens
Vulnerability tracking integration
Machine-readable export
100%
100%
Risk rating per finding
100%
100%
OWASP category per finding
0%
100%
Remediation per finding
25%
100%
All input findings included
100%
100%
Scope field present
100%
100%
Authorization statement
100%
100%
Tracking-system fields
80%
100%
Summary document
100%
100%
No single-paragraph blob
100%
100%
Without context: $0.2153 · 1m 1s · 13 turns · 20 in / 3,013 out tokens
With context: $0.5258 · 2m 9s · 27 turns · 31 in / 7,260 out tokens
Comprehensive OWASP Top 10 assessment
OWASP Top 10 organizing structure
40%
100%
Minimum 8 OWASP categories covered
41%
100%
Injection addressed
100%
100%
Broken access control addressed
100%
100%
Risk rating per finding
80%
100%
Remediation per finding
100%
100%
Target identification
100%
100%
Scope definition
100%
100%
Authorization confirmation
100%
100%
Executive summary
100%
100%
Negative findings included
100%
100%
Without context: $0.4258 · 2m 48s · 16 turns · 23 in / 8,726 out tokens
With context: $0.6568 · 3m 56s · 22 turns · 27 in / 12,794 out tokens
Safe exploitation demonstration documentation
No working exploit code
80%
60%
Conceptual PoC included
100%
100%
SQL injection demonstrated safely
80%
70%
XSS demonstrated safely
70%
80%
Risk rating per vulnerability
0%
0%
Remediation per vulnerability
100%
100%
Developer-oriented framing
100%
100%
Authorization statement
100%
100%
OWASP category mapping
0%
0%
Impact description
100%
100%
Without context: $0.2367 · 1m 35s · 9 turns · 11 in / 4,536 out tokens
With context: $0.3932 · 2m 17s · 18 turns · 20 in / 6,579 out tokens
CSRF and session security assessment
CSRF addressed
100%
100%
Session/cookie security addressed
100%
100%
Risk rating per finding
100%
100%
Remediation per finding
100%
100%
OWASP category mapping
90%
80%
Authorization statement
50%
20%
Scope defined
100%
100%
No live attack payloads
100%
100%
Conceptual PoC present
100%
75%
Executive summary
100%
100%
Without context: $0.3381 · 2m 35s · 12 turns · 19 in / 7,927 out tokens
With context: $0.4981 · 2m 52s · 21 turns · 367 in / 8,697 out tokens
Penetration testing methodology workflow
Target identification phase
100%
100%
Vulnerability scanning phase
100%
100%
Reporting phase
100%
100%
Authorization requirement
100%
100%
Scope definition requirement
100%
100%
OWASP Top 10 in scanning
83%
100%
Safe exploitation guidance
100%
100%
Report contents specified
100%
100%
Sequential phase ordering
100%
100%
Without context: $0.3262 · 2m 30s · 13 turns · 20 in / 7,132 out tokens
With context: $0.3910 · 2m 23s · 18 turns · 53 in / 6,559 out tokens
Full-stack web app security review report
SQL injection addressed
100%
100%
XSS addressed
100%
100%
CSRF addressed
25%
0%
Authentication/authorization addressed
100%
100%
OWASP used as framework
100%
100%
Risk rating per category
100%
100%
Remediation per finding
100%
100%
Authorization confirmed
12%
12%
Scope documented
100%
100%
Executive summary present
100%
100%
Negative findings documented
50%
25%
Target identified
100%
100%
Without context: $0.5815 · 4m 3s · 16 turns · 22 in / 12,689 out tokens
With context: $0.6552 · 3m 45s · 26 turns · 400 in / 11,922 out tokens
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.