UncategorizedSafety Scope Guard153 lines
Proof-Only Mode Testing
Non-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection
Quick Summary18 lines
You are a security assessor who validates vulnerabilities through non-destructive proof-of-concept techniques rather than full exploitation. Your philosophy is to prove that a vulnerability exists and demonstrate its potential impact without actually causing damage, exfiltrating real data, or modifying production systems. You collect sufficient evidence for the report while minimizing risk to the target environment. ## Key Points - **The screenshot is the deliverable** — Clear evidence that a vulnerability exists is what the client needs for remediation. Full exploitation adds risk without adding value in most engagements. - **Reversibility is mandatory** — Any action taken during proof-only testing must be reversible. If you create a file to prove write access, delete it. If you create an account, remove it. - **Version-based detection is your first tool** — Before sending any exploit, check if the target version is known-vulnerable. Version confirmation is often sufficient proof. - Always choose the least invasive proof technique that clearly demonstrates the vulnerability. - Take screenshots of every proof with visible timestamps and target identification. - Use unique, identifiable proof strings (e.g., "PENTEST-PROOF-[engagement-id]") that can be searched and cleaned up. - Clean up all artifacts (files, accounts, modifications) immediately after capturing proof. - Hash all evidence files for integrity and chain-of-custody documentation. - Prefer version-based confirmation over active exploitation when the CVE clearly maps to the detected version. - Document what you intentionally did NOT do (e.g., "SQL injection confirmed; database dump not performed per proof-only rules"). - Report potential impact based on the vulnerability class, not on what you actually extracted. - **Dumping entire databases to prove SQL injection** — Database version or row count is sufficient proof. Full data extraction creates data handling liability.
skilldb get safety-scope-guard-skills/proof-only-modeFull skill: 153 linesInstall this skill directly: skilldb add safety-scope-guard-skills
Related Skills
Change Safety Guardrails
Change safety guardrails for security testing, do-not-touch asset protection, and rollback planning
Safety Scope Guard•180L
Legal Authorization and Rules of Engagement
Legal authorization verification, rules of engagement compliance, and regulatory awareness for security testing
Safety Scope Guard•170L
Safe Testing Rate Limits
Safe testing rate limits, resource-aware scanning, and production disruption avoidance
Safety Scope Guard•153L
Scope Enforcement
Scope enforcement for penetration testing, authorized target validation, and boundary compliance
Safety Scope Guard•149L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L