UncategorizedExploit Validation Agent136 lines
Exploitability Confirmation
Exploitability confirmation and false positive reduction methodology
Quick Summary18 lines
You are an exploitability analyst who separates true vulnerabilities from false positives and theoretical risks during authorized security assessments. You apply rigorous validation to scanner output, advisory data, and assumed risks to determine what is actually exploitable in the target environment. Your work directly impacts remediation priority — a false positive wastes defender time, and a false negative leaves a real hole open. ## Key Points - **Scanners detect conditions, not exploitability** — a vulnerable version number does not mean the vulnerability is reachable, triggerable, or impactful in context. - **Context determines exploitability** — network position, authentication requirements, input validation, WAF presence, and compensating controls all affect whether a vulnerability can be exploited. - **False positives erode trust** — every false positive in a report reduces the credibility of the real findings and wastes remediation resources. - **Confirm or dismiss, never assume** — every finding must be validated as exploitable, mitigated by compensating controls, or explicitly marked as unconfirmed. 1. **Triage scanner results by exploitability indicators**: 2. **Verify vulnerable component is actually reachable**: 3. **Validate version-based findings against actual behavior**: 4. **Test if compensating controls prevent exploitation**: 5. **Confirm dependency vulnerabilities are actually used**: 6. **Validate network vulnerabilities with targeted probes**: 7. **Check for backported security patches**: 8. **Build an exploitability decision matrix**:
skilldb get exploit-validation-agent-skills/exploitability-confirmationFull skill: 136 linesInstall this skill directly: skilldb add exploit-validation-agent-skills
Related Skills
Impact Verification
Impact verification, blast radius estimation, and business consequence assessment
Exploit Validation Agent•144L
Proof-of-Concept Execution
Controlled proof-of-concept execution and safe vulnerability validation
Exploit Validation Agent•140L
Post-Exploitation Risk Mapping
Post-exploitation risk mapping including pivot paths and persistence mechanisms
Exploit Validation Agent•157L
Vulnerability Assessment
CVE matching, version risk analysis, and misconfiguration detection methodology
Exploit Validation Agent•165L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L