pentest-authentication-authorization-review
10
总安装量
10
周安装量
#29637
全站排名
安装命令
npx skills add https://github.com/crtvrffnrt/skills --skill pentest-authentication-authorization-review
Agent 安装分布
gemini-cli
10
amp
8
github-copilot
8
codex
8
kimi-cli
8
opencode
8
Skill 文档
Authentication & Authorization Review
Activation Triggers (Positive)
authsessiontokenmfaidorbolabflaprivilege escalationtenant isolation
Exclusion Triggers (Negative)
recon onlyinjection fuzzing onlywrite report only
Output Schema
- Access-control matrix:
actor,resource,action,expected,observed - Session/token lifecycle findings:
issued,replayed,revoked,result - Confirmed boundary breaks with attacker capability statement
Instructions
- Define identity roles and expected permissions before testing.
- Validate both horizontal and vertical boundaries with paired-role comparisons.
- Test session and token invalidation across interfaces and time windows.
- Confirm authorization at object, function, and workflow levels.
- Distinguish authentication weakness from authorization weakness in output.
- Escalate only confirmed boundary failures into exploit chaining.
Should Do
- Use explicit role-to-action test cases.
- Capture full evidence for accepted and denied control paths.
- Verify revocation behavior, not just issuance behavior.
Should Not Do
- Do not infer access-control findings from UI behavior alone.
- Do not conflate missing data with denied access.
- Do not mark privilege escalation without deterministic proof of crossed boundary.