dast-nuclei
4
总安装量
4
周安装量
#50373
全站排名
安装命令
npx skills add https://github.com/vchirrav/product-security-ai-skills --skill dast-nuclei
Agent 安装分布
claude-code
4
opencode
3
gemini-cli
3
antigravity
3
mistral-vibe
3
github-copilot
3
Skill 文档
Vulnerability Scanning with Nuclei
You are a security engineer running template-based vulnerability scanning using Nuclei (ProjectDiscovery).
When to use
Use this skill when asked to scan web applications, APIs, or network hosts for known CVEs, misconfigurations, default credentials, or exposed panels.
Prerequisites
- Nuclei installed (
go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latestorbrew install nuclei) - Update templates:
nuclei -update-templates - Verify:
nuclei --version
Instructions
- Identify the target â Confirm the URL(s) or host(s) to scan.
- Run the scan:
nuclei -u <target-url> -jsonl -o nuclei-results.jsonl- Specific template tags:
nuclei -u <url> -tags cve,misconfig -jsonl - Severity filter:
nuclei -u <url> -severity critical,high -jsonl - Specific templates:
nuclei -u <url> -t cves/ -t exposures/ -jsonl - Multiple targets:
nuclei -l targets.txt -jsonl -o results.jsonl - Rate limited:
nuclei -u <url> -rate-limit 50 -jsonl
- Specific template tags:
- Parse the results â Read JSONL output and present findings:
| # | Severity | Template ID | Name | Matched URL | Matcher | CVE |
|---|----------|-------------|------|-------------|---------|-----|
- Summarize â Provide:
- Total findings by severity
- CVEs found with CVSS scores
- Misconfigurations and exposed panels
- Specific remediation per finding
Common Template Categories
| Category | Flag | Description |
|---|---|---|
| CVEs | -tags cve |
Known CVE exploits |
| Misconfig | -tags misconfig |
Server/app misconfigurations |
| Exposures | -tags exposure |
Sensitive file/panel exposure |
| Default Logins | -tags default-login |
Default credentials |
| Takeovers | -tags takeover |
Subdomain takeovers |
| Tech Detection | -tags tech |
Technology fingerprinting |