Performs authorized web application and API penetration testing with focus on OWASP-style risks and business logic flaws. Use when assessing websites, web APIs, authentication flows, session handling, and input validation.
91
86%
Does it follow best practices?
Impact
100%
1.51xAverage score across 3 eval scenarios
Passed
No known issues
Test only approved applications, domains, and endpoints. Respect rate limits and data handling constraints. Use non-destructive proofs and avoid unauthorized data extraction.
# Web App Assessment Output
## Coverage
- Application/API in scope:
- Roles tested:
- Key workflows:
## Findings
- Finding:
- Endpoint/feature:
- Preconditions:
- Evidence:
- Impact:
- Fix recommendation:
- Regression test idea:
## Attack Path Summary
- Initial condition:
- Exploit chain:
- Business consequence:a8ff73a
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.