📦 网页 安全 Penetration Test

v1.0.0

Automates 网页 安全 penetration 测试 by performing reconnaissance, vulnerability scanning, exploitation, and generating detailed compliance reports.

0· 33·0 当前·0 累计
liubo2025code 头像by @liubo2025code·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/17
安全扫描
VirusTotal
可疑
查看报告
OpenClaw
安全
medium confidence
The skill's files, instructions, and payloads are consistent with a web penetration-testing toolkit; it requests no unrelated credentials or install-time downloads, but it contains destructive/exfiltrative payloads and examples that require careful, authorized use.
评估建议
This package is coherent with a penetration-testing toolkit, but it includes explicit attack payloads (reverse shells, exfiltration examples, cloud metadata access) that can be destructive or leak data. Only run this skill against systems you are authorized to test. Before installing or running: review and edit config.yaml scope/exclusions; remove or blank any webhook/Jira/SMTP/GitHub tokens if you don't intend to integrate; enable safe defaults (e.g., verify_ssl: true, lower concurrency); do no...
详细分析 ▾
用途与能力
Name/description match the contents: scripts for reconnaissance, vulnerability scanning, exploitation, and reporting are present along with payload corpuses and configuration files. Required system tools listed (nmap, sqlmap, nikto, gobuster, etc.) are appropriate for the stated purpose and there are no unrelated environment variables or external cloud credentials declared.
指令范围
SKILL.md instructs the agent to run scanning and exploitation scripts (e.g., run full_pentest, sql_injection_test, generate reports). That scope is appropriate for a pentest skill, but the instructions and bundled payload files include explicit destructive payloads (reverse shells, curl/wget to attacker hosts, payloads that exfiltrate cookies or cloud metadata). These behaviors are expected for a pentesting tool but are high-risk if run against unauthorized targets or on the host running the agent.
安装机制
No remote install spec is included (instruction-only install/copy into skills directory). There are no downloads from arbitrary URLs or archive extraction steps in an installer. The code bundle is present in the repository, so installation is a local copy and dependency installation via pip/apt/brew as documented; that is proportionate and transparent.
凭证需求
The registry metadata declares no required env vars or primary credential. The repo/config contain optional integration fields (Slack webhook, SMTP, Jira/GitHub tokens) but these are empty by default and not required. No unrelated cloud or system credentials are demanded at install-time.
持久化与权限
always: false and the skill does not request elevated platform privileges. Model-invocation is allowed (the default) which is normal; because the skill can run powerful scans and exploitation scripts, users should be careful about autonomous invocation in production agents, but autonomy alone is not an incoherence here.
config/config.yaml:309
Install source points to URL shortener or raw IP.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.02026/4/17

security, pentest, web, owasp, vulnerability

可疑

安装命令

点击复制
官方npx clawhub@latest install web-security-pentest-skill-complete
镜像加速npx clawhub@latest install web-security-pentest-skill-complete --registry https://cn.longxiaskill.com镜像同步中
需要定制?告诉我你的需求 →
数据来源ClawHub ↗ · 中文优化:龙虾技能库