Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    danielmiessler

    webassessment

    danielmiessler/webassessment
    Security
    6,313
    2 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    Web security assessment. USE WHEN web assessment, pentest, security testing, vulnerability scan. SkillSearch('webassessment') for docs.

    SKILL.md

    Customization

    Before executing, check for user customizations at: ~/.claude/skills/PAI/USER/SKILLCUSTOMIZATIONS/WebAssessment/

    If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.

    🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)

    You MUST send this notification BEFORE doing anything else when this skill is invoked.

    1. Send voice notification:

      curl -s -X POST http://localhost:8888/notify \
        -H "Content-Type: application/json" \
        -d '{"message": "Running the WORKFLOWNAME workflow in the WebAssessment skill to ACTION"}' \
        > /dev/null 2>&1 &
      
    2. Output text notification:

      Running the **WorkflowName** workflow in the **WebAssessment** skill to ACTION...
      

    This is not optional. Execute this curl command immediately upon skill invocation.

    WebAssessment Skill

    Security assessment infrastructure integrating reconnaissance, threat modeling, and vulnerability testing.

    Workflow Routing

    Trigger Workflow
    "understand application", "what does this app do", "map the application" UnderstandApplication
    "threat model", "attack scenarios", "how would I attack" CreateThreatModel
    "pentest", "security assessment", "test for vulnerabilities" Pentest/MasterMethodology
    "fuzz with ffuf", "directory fuzzing", "content discovery" Ffuf/FfufGuide
    "OSINT", "reconnaissance", "open source intelligence" Osint/MasterGuide
    "test web app", "Playwright", "browser automation" Webapp/TestingGuide
    "bug bounty", "bounty programs" BugBounty/Programs
    "vulnerability analysis with AI", "Gemini analysis" VulnerabilityAnalysisGemini3

    Skill Integration

    WebAssessment coordinates with specialized skills:

    Phase Skill Purpose
    Scope Definition Recon Corporate structure, domain enumeration
    Target Discovery Recon Subdomains, endpoints, ports
    Understanding WebAssessment App narrative, user flows, sensitive data
    Threat Modeling WebAssessment Attack scenarios, test prioritization
    Injection Testing PromptInjection LLM-specific attacks
    Intelligence OSINT People, companies, social media

    Assessment Workflow

    1. Corporate Structure (Recon) → Define scope and targets
    2. Subdomain Enumeration (Recon) → Find all domains
    3. Endpoint Discovery (Recon) → Extract JS endpoints
    4. Understand Application → Build app narrative
    5. Create Threat Model → Prioritize attack scenarios
    6. Execute Testing → Test against identified threats
    7. Report Findings → Document with PoCs
    

    Recon Skill Tools

    WebAssessment uses tools from the Recon skill:

    # Corporate structure for scope
    bun ~/.claude/skills/Recon/Tools/CorporateStructure.ts target.com
    
    # Subdomain enumeration
    bun ~/.claude/skills/Recon/Tools/SubdomainEnum.ts target.com
    
    # Endpoint discovery from JavaScript
    bun ~/.claude/skills/Recon/Tools/EndpointDiscovery.ts https://target.com
    
    # Port scanning
    bun ~/.claude/skills/Recon/Tools/PortScan.ts target.com
    
    # Path discovery
    bun ~/.claude/skills/Recon/Tools/PathDiscovery.ts https://target.com
    

    UnderstandApplication Output

    Produces structured narrative including:

    • Summary: Purpose, industry, user base, critical functions
    • User Roles: Access levels and capabilities
    • User Flows: Step-by-step processes with sensitive data
    • Technology Stack: Frontend, backend, auth, third-party
    • Attack Surface: Entry points, inputs, file uploads, websockets

    CreateThreatModel Output

    Generates prioritized attack plan:

    • Threats: OWASP/CWE mapped with risk scores
    • Attack Paths: Multi-step attack scenarios
    • Test Plan: Prioritized with tool suggestions
    • Effort Estimates: Quick/medium/extensive per threat

    Threat Categories

    Category Triggers On
    Authentication Auth mechanisms detected
    Access Control Multiple user roles
    Injection All web apps
    Data Exposure Sensitive data identified
    File Upload Upload functionality
    API Security API endpoints
    WebSocket WebSocket detected
    Business Logic All web apps
    Payment Security Payment flows

    6-Phase Pentest Methodology

    Phase 0: Scoping & Preparation Phase 1: Reconnaissance (Recon skill) Phase 2: Mapping (content discovery) Phase 3: Vulnerability Analysis Phase 4: Exploitation Phase 5: Reporting

    Key Principles

    1. Authorization first - Never test without explicit permission
    2. Understand before testing - Build app narrative first
    3. Threat model guides testing - Don't test blindly
    4. Breadth then depth - Wide recon, focused exploitation
    5. Document everything - Notes, screenshots, commands

    Workflow Index

    Core Assessment:

    • Workflows/UnderstandApplication.md - Application reconnaissance
    • Workflows/CreateThreatModel.md - Attack scenario generation

    Penetration Testing:

    • Workflows/Pentest/MasterMethodology.md - 6-phase methodology
    • Workflows/Pentest/ToolInventory.md - Security tools reference
    • Workflows/Pentest/Reconnaissance.md - Asset discovery
    • Workflows/Pentest/Exploitation.md - Vulnerability testing

    Web Fuzzing:

    • Workflows/Ffuf/FfufGuide.md - FFUF fuzzing guide
    • Workflows/Ffuf/FfufHelper.md - Automated fuzzing helper

    Bug Bounty:

    • Workflows/BugBounty/Programs.md - Program tracking
    • Workflows/BugBounty/AutomationTool.md - Bounty automation

    Web App Testing:

    • Workflows/Webapp/TestingGuide.md - Playwright testing
    • Workflows/Webapp/Examples.md - Testing patterns

    OSINT:

    • Workflows/Osint/MasterGuide.md - OSINT methodology
    • Workflows/Osint/Reconnaissance.md - Domain recon
    • Workflows/Osint/SocialMediaIntel.md - SOCMINT
    • Workflows/Osint/Automation.md - SpiderFoot/Maltego
    • Workflows/Osint/MetadataAnalysis.md - ExifTool analysis

    AI-Powered:

    • Workflows/VulnerabilityAnalysisGemini3.md - Gemini deep analysis

    Examples

    Example 1: Full assessment workflow

    User: "Security assessment on app.example.com"
    → Run UnderstandApplication to build narrative
    → Run CreateThreatModel to prioritize testing
    → Follow MasterMethodology with threat model guidance
    → Report findings with OWASP/CWE references
    

    Example 2: Quick threat model

    User: "How would I attack this app?"
    → Run CreateThreatModel on target
    → Get prioritized attack paths
    → Get test plan with tool suggestions
    

    Example 3: Integrate with Recon

    User: "Assessment on target.com including all subdomains"
    → CorporateStructure (Recon) → Find parent/child companies
    → SubdomainEnum (Recon) → Find all subdomains
    → EndpointDiscovery (Recon) → Extract JS endpoints
    → UnderstandApplication → Build app narrative
    → CreateThreatModel → Generate attack plan
    
    Recommended Servers
    Cloudflare
    Cloudflare
    Nimble MCP Server
    Nimble MCP Server
    Apify
    Apify
    Repository
    danielmiessler/personal_ai_infrastructure
    Files