Performs authorized fuzzing of web applications and APIs to discover input validation failures, parser bugs, and stability issues. Use when testing HTTP endpoints, request parameters, payload handling, and error behavior under malformed or unexpected inputs.
95
92%
Does it follow best practices?
Impact
99%
1.41xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Run fuzzing only against explicitly approved targets and test environments. Respect rate limits, test windows, and service stability constraints. Pause immediately if production impact risk increases.
# Web/API Fuzzing Output
## Scope and Configuration
- Targets:
- Auth context:
- Rate/concurrency limits:
- Stop conditions:
## Findings
- Finding:
- Endpoint:
- Trigger input:
- Observed behavior:
- Repro steps:
- Security/availability impact:
- Recommended fix:
## Stability and Detection Notes
- Availability effects:
- Alerting/monitoring observations:
## Regression Test Cases
- Case:
- Expected safe behavior:a8ff73a
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.