pentest
npx skills add https://github.com/transilienceai/communitytools --skill pentest
Agent 安装分布
Skill 文档
Coordinate penetration testing. Deploy executors, aggregate results, generate reports. Use it when user requests pentesting, security assessment, vulnerability testing, bug bounty hunting.
Workflow
Phase 1: Initialization
- Gather scope: Target URL, restrictions, testing window
- Create engagement folder:
outputs/{engagement-name}/
Phase 2: Reconnaissance (Read reference/RECONNAISSANCE_OUTPUT.md to get outputs format)
- Select reconnaissance tools based on asset type (domains, web apps, APIs, network, cloud)
- Run tools in parallel using pentest-executor agents
- Generate asset-specific inventory files (JSON format per asset type) using the defined output format
- Generate the final
reconnaissance_report.mdfile using the defined output format
Phase 3: Planning & Approval (MANDATORY)
- Analyze reconnaissance findings from the
outputs/{engagement}/reconnaissance/and the reports.md files - Create test plan: Executors to deploy, attack surface justification, testing approach
- Present plan to user via AskUserQuestion
- Get explicit approval if not already approved in the first phase: “Approve plan?”, “Modify executors?”, “Cancel?”
- CRITICAL: Do NOT proceed to Phase 4 without user approval
Phase 4: Vulnerability Testing
- Deploy approved executors in parallel (single Task call with run_in_background=True)
- Monitor progress: Periodic TaskOutput(block=False)
- Recursive spawning: New discoveries trigger new executors (ask approval if major change)
Phase 5: Aggregation
- Collect findings from all executors
- Deduplicate (same vuln + location = duplicate)
- Identify exploit chains
- Calculate severity metrics
Phase 6: Reporting (Read reference/FINAL_REPORT.md – includes DOCX conversion)
- CRITICAL: Create folder structure FIRST:
report/andprocessed/with subdirectories - Move ALL working files to
processed/: reconnaissance/, findings/, activity/ âprocessed/ - Move ALL intermediate files: ANY .md files, drafts, analysis â
processed/intermediate-reports/ - Generate markdown report: Use
reference/FINAL_REPORT.mdtemplate âprocessed/intermediate-reports/pentest-final-report.md - REQUIRED: Generate .docx: Run pandoc command â
report/Penetration-Test-Report.docx(cover page, TOC, body, appendix section) - Optional: Generate PDF: If LaTeX available â
report/Penetration-Test-Report.pdf, else skip (DOCX is primary deliverable) - Copy referenced evidence: Organize by finding â
report/appendix/finding-{id}/ - Create report README: Document deliverables in
report/README.md - VERIFY CLEAN STRUCTURE:
ls -la outputs/{engagement}/shows ONLYreport/andprocessed/ - CRITICAL: NO intermediate files in root or report/ – Everything goes to
processed/except final deliverables (.docx, .json, README, appendix/)
What This Skill Does
- Attack Index – References 50+ attack types with documentation paths
- Methodology Frameworks – PTES, OWASP WSTG, MITRE ATT&CK, Flaw Hypothesis
- Coordination – Guides pentester agent to deploy specialized attack agents
- Documentation – PortSwigger labs, cheat sheets, quickstarts per attack
Execution: Delegated to specialized agents (SQL Injection Agent, XSS Agent, SSRF Agent, etc.)
Attack Categories
9 categories, 50+ attack types:
- Injection (6) | Client-Side (6) | Server-Side (6)
- Authentication (4) | API Security (4) | Web Applications (6)
- Cloud & Containers (5) | System (3) | Network (5) | Physical & Social (1)
See reference/ATTACK_INDEX.md for complete list with agent mappings.
Reconnaissance Asset Types
Five asset-specific output formats:
- Domains – Subdomains, DNS records, tech stack per subdomain
- Web Applications – Endpoints, forms, tech stack, cookies, JS analysis
- APIs – REST/GraphQL/WebSocket, auth methods, Swagger docs
- Network Services – Port scans, service versions, CVE candidates
- Cloud Infrastructure – S3 buckets, EC2 instances, security groups
See reference/RECONNAISSANCE_OUTPUT.md for complete format specifications and JSON schemas.
Final report
See reference/FINAL_REPORT.md for complete format specifications of the final report.
Output Structure
Complete folder organization (See reference/OUTPUT_STRUCTURE.md for details):
outputs/{engagement-name}/
âââ report/ # Complete deliverable package (3 files + appendix)
â âââ Penetration-Test-Report.docx # Main report (includes Referenced Files section)
â âââ Penetration-Test-Report.pdf # Optional PDF export
â âââ pentest-report.json # Machine-readable export
â âââ appendix/ # Referenced evidence only
â âââ finding-001/
â âââ finding-002/
â âââ reconnaissance-summary.json
âââ processed/ # All working/testing artifacts
âââ reconnaissance/ # Phase 2 outputs
â âââ inventory/
â âââ analysis/
â âââ reconnaissance_report.md
âââ findings/ # Phase 4 raw findings
â âââ {finding-id}/
âââ activity/ # NDJSON logs
â âââ {executor-name}.log
âââ helpers/ # Testing utilities
âââ test-frameworks/ # Testing scripts
âââ intermediate-reports/ # Drafts, markdown source, etc.
Critical: report/ = 3 files max + appendix/ subfolder. ALL intermediate files go to processed/.
Methodologies
PTES – 7-phase engagement lifecycle OWASP WSTG – 11 testing categories MITRE ATT&CK – TTP mapping across 14 phases Flaw Hypothesis – Stack analysis â Predict â Test â Generalize â Correlate
Integration
/authenticating– Authentication testing workflows/ai-threat-testing– LLM vulnerability testing/domain-assessment– Domain reconnaissance/web-application-mapping– Web app reconnaissance/cve-testing– CVE vulnerability testing
Critical Rules
Testing Rules
- Orchestration only – Never execute attacks directly
- Delegate execution – Deploy specialized agents for testing
- Documentation index – Reference attack folders for techniques
- Working PoCs required – Specialized agents must provide evidence
- Activity logging – All agents log actions to NDJSON activity logs
Output Organization Rules (PHASE 6 – CRITICAL)
- Two-folder structure ONLY:
report/(final deliverables) andprocessed/(working files) - NO files in engagement root: Everything must be in
report/orprocessed/ - Report folder contents: ONLY pentest-report.json, README.md, appendix/ folder (max 2-3 files + 1 folder)
- ALL intermediate files â processed/: .md files, drafts, analysis, summaries, checklists
- Reconnaissance â processed/reconnaissance/: ALL recon outputs
- Findings â processed/findings/: ALL raw finding details
- Activity logs â processed/activity/: ALL NDJSON logs
- Test frameworks â processed/test-frameworks/: SQL injection, command injection scripts
- Markdown reports â processed/intermediate-reports/: pentest-final-report.md, executive-summary.md, etc.
- VERIFY CLEAN: Before completing Phase 6, run
ls -la outputs/{engagement}/– must show ONLYreport/andprocessed/