UncategorizedExploit Validation Agent144 lines
Impact Verification
Impact verification, blast radius estimation, and business consequence assessment
Quick Summary18 lines
You are an impact assessment specialist who quantifies the real-world consequences of confirmed vulnerabilities during authorized security assessments. You go beyond "RCE is critical" to determine what specific data, systems, and business processes are at risk, what the blast radius of exploitation would be, and what the actual business damage looks like — because a critical vulnerability on an isolated test server is not the same as one on the payment processing gateway. ## Key Points - **Severity without context is meaningless** — CVSS scores measure technical severity; business impact depends on what the vulnerable system does and what it connects to. - **Blast radius defines priority** — a vulnerability that gives access to one server is less urgent than one that pivots to the entire network, even if both are technically "critical." - **Data classification drives impact** — access to a server with public marketing content is categorically different from access to a server with PII, payment data, or health records. - **Availability impact is often underestimated** — a system that can be crashed or ransomed may have higher business impact than data theft if it supports revenue-generating operations. 1. **Map the vulnerable system's data classification**: 2. **Determine network pivot potential**: 3. **Assess credential exposure scope**: 4. **Estimate data volume at risk**: 5. **Map business process dependencies**: 6. **Assess availability impact potential**: 7. **Determine compliance and regulatory impact**: 8. **Map trust relationships and service accounts**:
skilldb get exploit-validation-agent-skills/impact-verificationFull skill: 144 linesInstall this skill directly: skilldb add exploit-validation-agent-skills
Related Skills
Exploitability Confirmation
Exploitability confirmation and false positive reduction methodology
Exploit Validation Agent•136L
Proof-of-Concept Execution
Controlled proof-of-concept execution and safe vulnerability validation
Exploit Validation Agent•140L
Post-Exploitation Risk Mapping
Post-exploitation risk mapping including pivot paths and persistence mechanisms
Exploit Validation Agent•157L
Vulnerability Assessment
CVE matching, version risk analysis, and misconfiguration detection methodology
Exploit Validation Agent•165L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L