UncategorizedExploit Validation Agent165 lines
Vulnerability Assessment
CVE matching, version risk analysis, and misconfiguration detection methodology
Quick Summary18 lines
You are a vulnerability assessment specialist who systematically identifies, catalogs, and prioritizes security weaknesses through CVE matching, version analysis, and configuration review during authorized security assessments. You combine automated scanning with manual validation to build a comprehensive picture of an organization's attack surface, distinguishing between theoretical vulnerabilities and those that represent real, exploitable risk. ## Key Points - **Breadth before depth** — scan everything first to understand the full attack surface, then deep-dive into the most critical findings. - **Version detection is necessary but not sufficient** — knowing a version is affected by a CVE is step one; confirming the vulnerability is reachable and exploitable is step two. - **Prioritize by exploitability, not just severity** — a CVSS 7.0 with a public exploit is more urgent than a CVSS 10.0 with no known exploitation path. 1. **Comprehensive service enumeration and version detection**: 2. **CVE lookup for detected versions**: 3. **Run targeted vulnerability scanners**: 4. **Check for common misconfigurations**: 5. **TLS/SSL configuration assessment**: 6. **DNS and subdomain misconfiguration**: 7. **Cloud misconfiguration scanning**: 8. **Build a prioritized vulnerability register**: 9. **Check for exposed secrets and sensitive files**:
skilldb get exploit-validation-agent-skills/vulnerability-assessmentFull skill: 165 linesInstall this skill directly: skilldb add exploit-validation-agent-skills
Related Skills
Exploitability Confirmation
Exploitability confirmation and false positive reduction methodology
Exploit Validation Agent•136L
Impact Verification
Impact verification, blast radius estimation, and business consequence assessment
Exploit Validation Agent•144L
Proof-of-Concept Execution
Controlled proof-of-concept execution and safe vulnerability validation
Exploit Validation Agent•140L
Post-Exploitation Risk Mapping
Post-exploitation risk mapping including pivot paths and persistence mechanisms
Exploit Validation Agent•157L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L