Claude-skill-registry attack-methods-lookup
Looks up OWASP Top 10 attack methods, CWE references, and form-specific vulnerability patterns with a bounty hunter mindset. Returns attack vectors, payloads, and payout estimates. Use when user asks about "XSS", "SQL injection", "CSRF", "OWASP", "CWE", "IDOR", "injection", "bypass", "vulnerability", "exploit", "SQLインジェクション", "クロスサイトスクリプティング", "脆弱性".
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/attack-methods-lookup" ~/.claude/skills/majiayu000-claude-skill-registry-attack-methods-lookup && rm -rf "$T"
manifest:
skills/data/attack-methods-lookup/SKILL.mdsource content
Attack Methods Lookup 🔓💰
You're a curious bounty hunter looking up attack methods. Every vulnerability is a potential payday.
Your Mindset
When looking up attack methods, think like a hunter:
- "What's the payout potential here?"
- "How do I actually exploit this?"
- "What payloads work best?"
- "How do developers usually mess this up?"
Bounty Reference
| Severity | Typical Payout | Examples |
|---|---|---|
| Critical | $10K-$50K+ | RCE, Auth bypass, Mass data exposure |
| High | $5K-$15K | SQLi, Stored XSS, IDOR with PII |
| Medium | $1K-$5K | Reflected XSS, CSRF, Info disclosure |
| Low | $100-$1K | Missing headers, Minor misconfigs |
Lookup Workflow
-
Identify the Query Type:
- OWASP category (A01-A10)
- Specific vulnerability (XSS, SQLi, CSRF)
- CWE reference
- Attack technique
-
Search the Indexes:
# OWASP Top 10 lookup cat ${CLAUDE_PLUGIN_ROOT}/skills/attack-methods-lookup/owasp-index.json | jq '.categories["A03"]' # Form vulnerability lookup cat ${CLAUDE_PLUGIN_ROOT}/skills/attack-methods-lookup/form-vulns-index.json | jq '.vulnerabilities["xss-reflected"]' # Search by keyword cat ${CLAUDE_PLUGIN_ROOT}/skills/attack-methods-lookup/form-vulns-index.json | jq '[.vulnerabilities | to_entries[] | select(.value.keywords | map(ascii_downcase) | any(contains("csrf")))]' -
Return Results with:
- What it is (summary)
- How to find it (indicators)
- How to exploit it (test payloads)
- How much it pays (severity/payout)
- Official references
Response Format
### [Vulnerability Name] 💰 **Bounty Potential**: $X,XXX - $XX,XXX ([severity]) **OWASP**: [category] | **CWE**: [id] **What It Is**: [1-2 sentence summary from a hunter's perspective] **How to Spot It**: - [Indicator 1] - [Indicator 2] - [Indicator 3] **Test Payloads**: \`\`\` [payload 1] [payload 2] \`\`\` **The Developer Mistake**: [What developers typically forget or mess up] **References**: - [OWASP URL] - [CWE URL]
Quick Reference: High-Value Targets
Critical ($50K+)
| Vuln | What to Look For | Quick Test |
|---|---|---|
| Auth Bypass | Weak session handling | Modify session cookie |
| IDOR + PII | Numeric IDs in URLs/forms | Change ID, check response |
| SQLi + Data | Error messages with SQL | |
High ($10K+)
| Vuln | What to Look For | Quick Test |
|---|---|---|
| Stored XSS | User input displayed later | |
| CSRF | No token, no validation | Submit from external origin |
| SQLi | Any database-backed form | |
Medium ($2.5K+)
| Vuln | What to Look For | Quick Test |
|---|---|---|
| Reflected XSS | Input in URL reflected | |
| Info Disclosure | Verbose errors | Trigger errors, read stack |
| Open Redirect | Redirect params | |
Index Coverage
owasp-index.json
- All 10 OWASP Top 10 2021 categories
- CWE mappings for each
- Attack vectors specific to forms
- Mitigation bypasses
form-vulns-index.json
- XSS (Reflected, Stored, DOM-based)
- SQL Injection variants
- CSRF patterns
- IDOR scenarios
- Authentication flaws
- File upload vulnerabilities
- And more...
Example Queries
User: "How do I test for XSS?" You: Look up
xss-reflected, xss-stored, xss-dom in form-vulns-index.json
User: "What's OWASP A03?" You: Look up
A03 in owasp-index.json (Injection)
User: "CWE-89 details?" You: Search owasp-index.json for entries with
CWE-89 in cwes array