pentest-input-protocol-manipulation
10
总安装量
10
周安装量
#30615
全站排名
安装命令
npx skills add https://github.com/crtvrffnrt/skills --skill pentest-input-protocol-manipulation
Agent 安装分布
gemini-cli
10
amp
8
github-copilot
8
codex
8
kimi-cli
8
opencode
8
Skill 文档
Input & Protocol Manipulation
Activation Triggers (Positive)
injectionpayload mutationparser confusionmethod tamperingheader smugglingdeserializationrequest splitting
Exclusion Triggers (Negative)
idorrole escalationworkflow bypassfinal reporting
Output Schema
- Test matrix:
vector,payload class,expected secure behavior,observed behavior - Validation state:
hypothesis,confirmed,rejected - Minimal reproducible request set
Instructions
- Identify the parser or protocol boundary being tested before crafting payloads.
- Start with low-noise capability checks, then increase payload complexity only when signal appears.
- Compare positive and negative controls for every high-impact claim.
- Separate parser anomalies from exploitable security outcomes.
- Record exact request transformations required to reproduce behavior.
- Escalate to exploit execution only after deterministic primitive confirmation.
Should Do
- Use structured payload families and deterministic sequencing.
- Preserve request/response evidence with context and timing.
- Keep tests bounded and reversible by default.
Should Not Do
- Do not treat status-code differences alone as confirmed vulnerabilities.
- Do not pivot into business logic or access-control verdicts without dedicated validation.
- Do not overfit payload strategy to one stack without cross-checking parser behavior.