web-security-testing

Web application security testing workflow for OWASP Top 10 vulnerabilities including injection, XSS, authentication flaws, and access control issues.

INSTALLATION
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill web-security-testing
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

Web Security Testing Workflow

Overview

Specialized workflow for testing web applications against OWASP Top 10 vulnerabilities including injection attacks, XSS, broken authentication, and access control issues.

When to Use This Workflow

Use this workflow when:

  • Testing web application security
  • Performing OWASP Top 10 assessment
  • Conducting penetration tests
  • Validating security controls
  • Bug bounty hunting

Workflow Phases

Phase 1: Reconnaissance

#### Skills to Invoke

  • scanning-tools - Security scanning
  • top-web-vulnerabilities - OWASP knowledge

#### Actions

  • Map application surface
  • Identify technologies
  • Discover endpoints
  • Find subdomains
  • Document findings

#### Copy-Paste Prompts

Use @scanning-tools to perform web application reconnaissance

Phase 2: Injection Testing

#### Skills to Invoke

  • sql-injection-testing - SQL injection
  • sqlmap-database-pentesting - SQLMap

#### Actions

  • Test SQL injection
  • Test NoSQL injection
  • Test command injection
  • Test LDAP injection
  • Document vulnerabilities

#### Copy-Paste Prompts

Use @sql-injection-testing to test for SQL injection
Use @sqlmap-database-pentesting to automate SQL injection testing

Phase 3: XSS Testing

#### Skills to Invoke

  • xss-html-injection - XSS testing
  • html-injection-testing - HTML injection

#### Actions

  • Test reflected XSS
  • Test stored XSS
  • Test DOM-based XSS
  • Test XSS filters
  • Document findings

#### Copy-Paste Prompts

Use @xss-html-injection to test for cross-site scripting

Phase 4: Authentication Testing

#### Skills to Invoke

  • broken-authentication - Authentication testing

#### Actions

  • Test credential stuffing
  • Test brute force protection
  • Test session management
  • Test password policies
  • Test MFA implementation

#### Copy-Paste Prompts

Use @broken-authentication to test authentication security

Phase 5: Access Control Testing

#### Skills to Invoke

  • idor-testing - IDOR testing
  • file-path-traversal - Path traversal

#### Actions

  • Test vertical privilege escalation
  • Test horizontal privilege escalation
  • Test IDOR vulnerabilities
  • Test directory traversal
  • Test unauthorized access

#### Copy-Paste Prompts

Use @idor-testing to test for insecure direct object references
Use @file-path-traversal to test for path traversal

Phase 6: Security Headers

#### Skills to Invoke

  • api-security-best-practices - Security headers

#### Actions

  • Check CSP implementation
  • Verify HSTS configuration
  • Test X-Frame-Options
  • Check X-Content-Type-Options
  • Verify referrer policy

#### Copy-Paste Prompts

Use @api-security-best-practices to audit security headers

Phase 7: Reporting

#### Skills to Invoke

  • reporting-standards - Security reporting

#### Actions

  • Document vulnerabilities
  • Assess risk levels
  • Provide remediation
  • Create proof of concept
  • Generate report

#### Copy-Paste Prompts

Use @reporting-standards to create security report

OWASP Top 10 Checklist

  • A01: Broken Access Control
  • A02: Cryptographic Failures
  • A03: Injection
  • A04: Insecure Design
  • A05: Security Misconfiguration
  • A06: Vulnerable Components
  • A07: Authentication Failures
  • A08: Software/Data Integrity
  • A09: Logging/Monitoring
  • A10: SSRF

Quality Gates

  • All OWASP Top 10 tested
  • Vulnerabilities documented
  • Proof of concepts captured
  • Remediation provided
  • Report generated

Related Workflow Bundles

  • security-audit - Security auditing
  • api-security-testing - API security
  • wordpress-security - WordPress security

Limitations

  • Use this skill only when the task clearly matches the scope described above.
  • Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
  • Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card