Guides controlled exploitation of validated vulnerabilities to measure real-world impact. Use when the user requests proof-of-concept validation, privilege escalation testing, or attack path confirmation in an authorized environment.
94
92%
Does it follow best practices?
Impact
96%
1.50xAverage score across 3 eval scenarios
Passed
No known issues
Only perform controlled exploitation on explicitly approved targets. Avoid destructive actions, production instability, and unnecessary data access. Stop immediately if impact exceeds rules of engagement.
# Gaining Access Output
## Tested Vulnerability
- Identifier:
- Target:
- Preconditions:
## Validation Result
- Exploitable: Yes/No/Partial
- Access achieved:
- Impact observed:
## Evidence
- Reproduction steps:
- Logs/screenshots/artifacts:
## Risk Statement
- Technical impact:
- Business impact:
- Likelihood:
## Handoff
- Needed remediation owners:
- Retest criteria:a8ff73a
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.