tribunal-kit 3.0.0 → 3.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. package/.agent/ARCHITECTURE.md +99 -99
  2. package/.agent/GEMINI.md +52 -52
  3. package/.agent/agents/accessibility-reviewer.md +187 -220
  4. package/.agent/agents/ai-code-reviewer.md +199 -233
  5. package/.agent/agents/backend-specialist.md +215 -238
  6. package/.agent/agents/code-archaeologist.md +161 -181
  7. package/.agent/agents/database-architect.md +184 -207
  8. package/.agent/agents/debugger.md +191 -218
  9. package/.agent/agents/dependency-reviewer.md +103 -136
  10. package/.agent/agents/devops-engineer.md +218 -238
  11. package/.agent/agents/documentation-writer.md +201 -221
  12. package/.agent/agents/explorer-agent.md +160 -180
  13. package/.agent/agents/frontend-reviewer.md +160 -194
  14. package/.agent/agents/frontend-specialist.md +248 -237
  15. package/.agent/agents/game-developer.md +48 -52
  16. package/.agent/agents/logic-reviewer.md +116 -149
  17. package/.agent/agents/mobile-developer.md +200 -223
  18. package/.agent/agents/mobile-reviewer.md +162 -195
  19. package/.agent/agents/orchestrator.md +181 -211
  20. package/.agent/agents/penetration-tester.md +157 -174
  21. package/.agent/agents/performance-optimizer.md +183 -203
  22. package/.agent/agents/performance-reviewer.md +178 -211
  23. package/.agent/agents/product-manager.md +142 -162
  24. package/.agent/agents/product-owner.md +6 -25
  25. package/.agent/agents/project-planner.md +142 -162
  26. package/.agent/agents/qa-automation-engineer.md +225 -242
  27. package/.agent/agents/security-auditor.md +174 -194
  28. package/.agent/agents/seo-specialist.md +193 -213
  29. package/.agent/agents/sql-reviewer.md +161 -194
  30. package/.agent/agents/supervisor-agent.md +184 -203
  31. package/.agent/agents/swarm-worker-contracts.md +17 -17
  32. package/.agent/agents/swarm-worker-registry.md +46 -46
  33. package/.agent/agents/test-coverage-reviewer.md +160 -193
  34. package/.agent/agents/test-engineer.md +0 -21
  35. package/.agent/agents/type-safety-reviewer.md +175 -208
  36. package/.agent/patterns/generator.md +9 -9
  37. package/.agent/patterns/inversion.md +12 -12
  38. package/.agent/patterns/pipeline.md +9 -9
  39. package/.agent/patterns/reviewer.md +13 -13
  40. package/.agent/patterns/tool-wrapper.md +9 -9
  41. package/.agent/rules/GEMINI.md +63 -63
  42. package/.agent/scripts/compress_skills.py +167 -0
  43. package/.agent/scripts/consolidate_skills.py +173 -0
  44. package/.agent/scripts/deep_compress.py +202 -0
  45. package/.agent/scripts/minify_context.py +80 -0
  46. package/.agent/scripts/security_scan.py +1 -1
  47. package/.agent/scripts/strip_tribunal.py +41 -0
  48. package/.agent/skills/agent-organizer/SKILL.md +92 -126
  49. package/.agent/skills/agentic-patterns/SKILL.md +0 -70
  50. package/.agent/skills/ai-prompt-injection-defense/SKILL.md +126 -160
  51. package/.agent/skills/api-patterns/SKILL.md +123 -215
  52. package/.agent/skills/api-security-auditor/SKILL.md +143 -177
  53. package/.agent/skills/app-builder/SKILL.md +326 -50
  54. package/.agent/skills/app-builder/templates/SKILL.md +13 -15
  55. package/.agent/skills/app-builder/templates/astro-static/TEMPLATE.md +16 -16
  56. package/.agent/skills/app-builder/templates/chrome-extension/TEMPLATE.md +22 -22
  57. package/.agent/skills/app-builder/templates/cli-tool/TEMPLATE.md +18 -18
  58. package/.agent/skills/app-builder/templates/electron-desktop/TEMPLATE.md +20 -20
  59. package/.agent/skills/app-builder/templates/express-api/TEMPLATE.md +17 -17
  60. package/.agent/skills/app-builder/templates/flutter-app/TEMPLATE.md +18 -18
  61. package/.agent/skills/app-builder/templates/monorepo-turborepo/TEMPLATE.md +21 -21
  62. package/.agent/skills/app-builder/templates/nextjs-fullstack/TEMPLATE.md +19 -19
  63. package/.agent/skills/app-builder/templates/nextjs-saas/TEMPLATE.md +26 -26
  64. package/.agent/skills/app-builder/templates/nextjs-static/TEMPLATE.md +26 -26
  65. package/.agent/skills/app-builder/templates/nuxt-app/TEMPLATE.md +19 -19
  66. package/.agent/skills/app-builder/templates/python-fastapi/TEMPLATE.md +18 -18
  67. package/.agent/skills/app-builder/templates/react-native-app/TEMPLATE.md +20 -20
  68. package/.agent/skills/appflow-wireframe/SKILL.md +87 -121
  69. package/.agent/skills/architecture/SKILL.md +82 -252
  70. package/.agent/skills/authentication-best-practices/SKILL.md +139 -173
  71. package/.agent/skills/bash-linux/SKILL.md +120 -154
  72. package/.agent/skills/behavioral-modes/SKILL.md +8 -69
  73. package/.agent/skills/brainstorming/SKILL.md +428 -104
  74. package/.agent/skills/building-native-ui/SKILL.md +143 -174
  75. package/.agent/skills/clean-code/SKILL.md +323 -360
  76. package/.agent/skills/code-review-checklist/SKILL.md +0 -62
  77. package/.agent/skills/config-validator/SKILL.md +107 -141
  78. package/.agent/skills/csharp-developer/SKILL.md +468 -528
  79. package/.agent/skills/database-design/SKILL.md +104 -369
  80. package/.agent/skills/deployment-procedures/SKILL.md +111 -145
  81. package/.agent/skills/devops-engineer/SKILL.md +295 -332
  82. package/.agent/skills/devops-incident-responder/SKILL.md +79 -113
  83. package/.agent/skills/doc.md +5 -5
  84. package/.agent/skills/documentation-templates/SKILL.md +19 -63
  85. package/.agent/skills/edge-computing/SKILL.md +123 -157
  86. package/.agent/skills/extract-design-system/SKILL.md +100 -134
  87. package/.agent/skills/framer-motion-expert/SKILL.md +111 -855
  88. package/.agent/skills/frontend-design/SKILL.md +151 -499
  89. package/.agent/skills/game-design-expert/SKILL.md +71 -105
  90. package/.agent/skills/game-engineering-expert/SKILL.md +88 -122
  91. package/.agent/skills/geo-fundamentals/SKILL.md +89 -124
  92. package/.agent/skills/github-operations/SKILL.md +279 -314
  93. package/.agent/skills/gsap-expert/SKILL.md +119 -826
  94. package/.agent/skills/i18n-localization/SKILL.md +104 -138
  95. package/.agent/skills/intelligent-routing/SKILL.md +159 -127
  96. package/.agent/skills/lint-and-validate/SKILL.md +8 -52
  97. package/.agent/skills/llm-engineering/SKILL.md +344 -357
  98. package/.agent/skills/local-first/SKILL.md +120 -154
  99. package/.agent/skills/mcp-builder/SKILL.md +84 -118
  100. package/.agent/skills/mobile-design/SKILL.md +213 -219
  101. package/.agent/skills/motion-engineering/SKILL.md +184 -0
  102. package/.agent/skills/nextjs-react-expert/SKILL.md +99 -698
  103. package/.agent/skills/nodejs-best-practices/SKILL.md +498 -559
  104. package/.agent/skills/observability/SKILL.md +293 -330
  105. package/.agent/skills/parallel-agents/SKILL.md +88 -122
  106. package/.agent/skills/performance-profiling/SKILL.md +217 -254
  107. package/.agent/skills/plan-writing/SKILL.md +84 -118
  108. package/.agent/skills/platform-engineer/SKILL.md +89 -123
  109. package/.agent/skills/playwright-best-practices/SKILL.md +128 -162
  110. package/.agent/skills/powershell-windows/SKILL.md +112 -146
  111. package/.agent/skills/python-patterns/SKILL.md +7 -35
  112. package/.agent/skills/python-pro/SKILL.md +148 -754
  113. package/.agent/skills/react-specialist/SKILL.md +123 -827
  114. package/.agent/skills/readme-builder/SKILL.md +15 -85
  115. package/.agent/skills/realtime-patterns/SKILL.md +269 -304
  116. package/.agent/skills/red-team-tactics/SKILL.md +10 -51
  117. package/.agent/skills/rust-pro/SKILL.md +623 -701
  118. package/.agent/skills/seo-fundamentals/SKILL.md +120 -154
  119. package/.agent/skills/server-management/SKILL.md +156 -190
  120. package/.agent/skills/shadcn-ui-expert/SKILL.md +172 -206
  121. package/.agent/skills/skill-creator/SKILL.md +18 -58
  122. package/.agent/skills/sql-pro/SKILL.md +579 -633
  123. package/.agent/skills/supabase-postgres-best-practices/SKILL.md +28 -68
  124. package/.agent/skills/swiftui-expert/SKILL.md +142 -176
  125. package/.agent/skills/systematic-debugging/SKILL.md +84 -118
  126. package/.agent/skills/tailwind-patterns/SKILL.md +516 -576
  127. package/.agent/skills/tdd-workflow/SKILL.md +103 -137
  128. package/.agent/skills/test-result-analyzer/SKILL.md +33 -73
  129. package/.agent/skills/testing-patterns/SKILL.md +512 -573
  130. package/.agent/skills/trend-researcher/SKILL.md +30 -71
  131. package/.agent/skills/ui-ux-pro-max/SKILL.md +0 -41
  132. package/.agent/skills/ui-ux-researcher/SKILL.md +51 -91
  133. package/.agent/skills/vue-expert/SKILL.md +127 -866
  134. package/.agent/skills/vulnerability-scanner/SKILL.md +354 -269
  135. package/.agent/skills/web-accessibility-auditor/SKILL.md +159 -193
  136. package/.agent/skills/web-design-guidelines/SKILL.md +17 -61
  137. package/.agent/skills/webapp-testing/SKILL.md +111 -145
  138. package/.agent/skills/whimsy-injector/SKILL.md +58 -132
  139. package/.agent/skills/workflow-optimizer/SKILL.md +28 -68
  140. package/.agent/workflows/api-tester.md +151 -151
  141. package/.agent/workflows/audit.md +127 -138
  142. package/.agent/workflows/brainstorm.md +110 -110
  143. package/.agent/workflows/changelog.md +112 -112
  144. package/.agent/workflows/create.md +124 -124
  145. package/.agent/workflows/debug.md +165 -189
  146. package/.agent/workflows/deploy.md +180 -189
  147. package/.agent/workflows/enhance.md +128 -151
  148. package/.agent/workflows/fix.md +114 -135
  149. package/.agent/workflows/generate.md +12 -4
  150. package/.agent/workflows/migrate.md +160 -160
  151. package/.agent/workflows/orchestrate.md +168 -168
  152. package/.agent/workflows/performance-benchmarker.md +114 -123
  153. package/.agent/workflows/plan.md +173 -173
  154. package/.agent/workflows/preview.md +80 -80
  155. package/.agent/workflows/refactor.md +161 -183
  156. package/.agent/workflows/review-ai.md +101 -129
  157. package/.agent/workflows/review.md +116 -116
  158. package/.agent/workflows/session.md +94 -94
  159. package/.agent/workflows/status.md +79 -79
  160. package/.agent/workflows/strengthen-skills.md +138 -139
  161. package/.agent/workflows/swarm.md +179 -179
  162. package/.agent/workflows/test.md +189 -211
  163. package/.agent/workflows/tribunal-backend.md +93 -113
  164. package/.agent/workflows/tribunal-database.md +94 -115
  165. package/.agent/workflows/tribunal-frontend.md +95 -118
  166. package/.agent/workflows/tribunal-full.md +92 -133
  167. package/.agent/workflows/tribunal-mobile.md +94 -119
  168. package/.agent/workflows/tribunal-performance.md +109 -133
  169. package/.agent/workflows/ui-ux-pro-max.md +122 -143
  170. package/package.json +1 -1
  171. package/.agent/skills/api-patterns/api-style.md +0 -42
  172. package/.agent/skills/api-patterns/auth.md +0 -24
  173. package/.agent/skills/api-patterns/documentation.md +0 -26
  174. package/.agent/skills/api-patterns/graphql.md +0 -41
  175. package/.agent/skills/api-patterns/rate-limiting.md +0 -31
  176. package/.agent/skills/api-patterns/response.md +0 -37
  177. package/.agent/skills/api-patterns/rest.md +0 -40
  178. package/.agent/skills/api-patterns/security-testing.md +0 -122
  179. package/.agent/skills/api-patterns/trpc.md +0 -41
  180. package/.agent/skills/api-patterns/versioning.md +0 -22
  181. package/.agent/skills/app-builder/agent-coordination.md +0 -71
  182. package/.agent/skills/app-builder/feature-building.md +0 -53
  183. package/.agent/skills/app-builder/project-detection.md +0 -34
  184. package/.agent/skills/app-builder/scaffolding.md +0 -118
  185. package/.agent/skills/app-builder/tech-stack.md +0 -40
  186. package/.agent/skills/architecture/context-discovery.md +0 -43
  187. package/.agent/skills/architecture/examples.md +0 -94
  188. package/.agent/skills/architecture/pattern-selection.md +0 -68
  189. package/.agent/skills/architecture/patterns-reference.md +0 -50
  190. package/.agent/skills/architecture/trade-off-analysis.md +0 -77
  191. package/.agent/skills/brainstorming/dynamic-questioning.md +0 -360
  192. package/.agent/skills/database-design/database-selection.md +0 -43
  193. package/.agent/skills/database-design/indexing.md +0 -39
  194. package/.agent/skills/database-design/migrations.md +0 -48
  195. package/.agent/skills/database-design/optimization.md +0 -36
  196. package/.agent/skills/database-design/orm-selection.md +0 -30
  197. package/.agent/skills/database-design/schema-design.md +0 -56
  198. package/.agent/skills/frontend-design/animation-guide.md +0 -331
  199. package/.agent/skills/frontend-design/color-system.md +0 -329
  200. package/.agent/skills/frontend-design/decision-trees.md +0 -418
  201. package/.agent/skills/frontend-design/motion-graphics.md +0 -306
  202. package/.agent/skills/frontend-design/typography-system.md +0 -363
  203. package/.agent/skills/frontend-design/ux-psychology.md +0 -1116
  204. package/.agent/skills/frontend-design/visual-effects.md +0 -383
  205. package/.agent/skills/intelligent-routing/router-manifest.md +0 -65
  206. package/.agent/skills/mobile-design/decision-trees.md +0 -516
  207. package/.agent/skills/mobile-design/mobile-backend.md +0 -491
  208. package/.agent/skills/mobile-design/mobile-color-system.md +0 -420
  209. package/.agent/skills/mobile-design/mobile-debugging.md +0 -122
  210. package/.agent/skills/mobile-design/mobile-design-thinking.md +0 -357
  211. package/.agent/skills/mobile-design/mobile-navigation.md +0 -458
  212. package/.agent/skills/mobile-design/mobile-performance.md +0 -767
  213. package/.agent/skills/mobile-design/mobile-testing.md +0 -356
  214. package/.agent/skills/mobile-design/mobile-typography.md +0 -433
  215. package/.agent/skills/mobile-design/platform-android.md +0 -666
  216. package/.agent/skills/mobile-design/platform-ios.md +0 -561
  217. package/.agent/skills/mobile-design/touch-psychology.md +0 -537
  218. package/.agent/skills/nextjs-react-expert/1-async-eliminating-waterfalls.md +0 -312
  219. package/.agent/skills/nextjs-react-expert/2-bundle-bundle-size-optimization.md +0 -240
  220. package/.agent/skills/nextjs-react-expert/3-server-server-side-performance.md +0 -490
  221. package/.agent/skills/nextjs-react-expert/4-client-client-side-data-fetching.md +0 -264
  222. package/.agent/skills/nextjs-react-expert/5-rerender-re-render-optimization.md +0 -581
  223. package/.agent/skills/nextjs-react-expert/6-rendering-rendering-performance.md +0 -432
  224. package/.agent/skills/nextjs-react-expert/7-js-javascript-performance.md +0 -684
  225. package/.agent/skills/nextjs-react-expert/8-advanced-advanced-patterns.md +0 -150
  226. package/.agent/skills/vulnerability-scanner/checklists.md +0 -121
@@ -1,174 +1,157 @@
1
- ---
2
- name: penetration-tester
3
- description: Offensive security analyst using MITRE ATT&CK methodology. Conducts structured vulnerability assessments covering recon, initial access, privilege escalation, lateral movement, and exfiltration paths. Produces actionable remediation reports. Always operates within defined scope only — never touches out-of-scope systems. Keywords: pentest, penetration, vulnerability, owasp, attack, exploit, red team, security.
4
- tools: Read, Grep, Glob, Bash, Edit, Write
5
- model: inherit
6
- skills: vulnerability-scanner, red-team-tactics
7
- version: 2.0.0
8
- last-updated: 2026-04-02
9
- ---
10
-
11
- # Penetration Tester — Offensive Security Analyst
12
-
13
- > "Think like an attacker. Report like an engineer."
14
- > You find what the security auditor misses: exploitable chains, not just individual vulnerabilities.
15
-
16
- ---
17
-
18
- ## ⚠️ MANDATORY SCOPE DECLARATION
19
-
20
- **Before any assessment, document and confirm:**
21
-
22
- ```
23
- Scope:
24
- In-Scope Systems: [list all IPs, domains, repos, APIs in scope]
25
- Out-of-Scope: [list excluded systems — violating scope is illegal]
26
- Authorization: [who authorized this engagement]
27
- Testing Window: [allowed times to test]
28
- Emergency Contact: [who to call if unintended impact occurs]
29
- ```
30
-
31
- **NEVER test systems not explicitly in the declared scope.** This is not a guideline — it is a legal constraint.
32
-
33
- ---
34
-
35
- ## 1. MITRE ATT&CK Assessment Phases
36
-
37
- ```
38
- Phase 1: Reconnaissance → Information gathering (passive + active)
39
- Phase 2: Initial Access → Entry point identification and exploitation
40
- Phase 3: Execution → Code execution and persistence
41
- Phase 4: Privilege Escalation → Low → High privilege paths
42
- Phase 5: Lateral Movement → Cross-service, cross-tenant access
43
- Phase 6: Exfiltration → Data access paths and extraction vectors
44
- Phase 7: Report → Evidence-based findings with CVSS scores
45
- ```
46
-
47
- ---
48
-
49
- ## 2. Web Application Attack Vectors
50
-
51
- ### Authentication Testing
52
-
53
- ```
54
- □ Brute force: No lockout after N failed attempts?
55
- □ Credential stuffing: Common password lists accepted?
56
- □ JWT: algorithm confusion (RS256 → HS256)? 'none' algorithm accepted?
57
- □ Session fixation: Session ID unchanged after login?
58
- □ Logout: Token still valid after server-side logout?
59
- □ Password reset: Token in URL (leaks in Referrer header)? Reusable tokens?
60
- □ MFA bypass: Can MFA step be skipped by direct navigation?
61
- ```
62
-
63
- ### Authorization Testing (IDOR / BAC)
64
-
65
- ```
66
- □ IDOR horizontal: Can User A access User B's resources by changing ID?
67
- □ IDOR vertical: Can user escalate to admin by changing role parameter?
68
- □ Mass assignment: Can user update their own 'role' field via API?
69
- □ Path traversal: /../../../etc/passwd via file download endpoints?
70
- □ Forced browsing: Can unauthenticated user access /admin without being redirected?
71
- ```
72
-
73
- ### Injection Testing
74
-
75
- ```
76
- □ SQL injection: ' OR 1=1--, UNION SELECT NULL--
77
- □ NoSQL injection: { "$gt": "" } in MongoDB queries
78
- □ Command injection: ; ls, | cat /etc/passwd
79
- □ SSTI: {{7*7}} → 49? (Jinja2, Twig, Handlebars templates)
80
- □ XSS: <script>alert(1)</script> in all user-input fields
81
- □ XXE: XML input with external entity including file:///etc/passwd
82
- ```
83
-
84
- ---
85
-
86
- ## 3. Infrastructure Attack Vectors
87
-
88
- ```
89
- □ SSRF: Can app be made to fetch internal endpoints (169.254.169.254)?
90
- □ Open redirect: ?redirect=https://evil.com after login?
91
- □ Deserialization: Untrusted serialized object processing?
92
- □ Exposed debug endpoints: /debug, /actuator/env, /heap, /.env accessible?
93
- □ Cloud metadata: AWS IMDS accessible via SSRF (http://169.254.169.254/latest/meta-data/)?
94
- □ S3/GCS: Buckets publicly listable? Write permissions open?
95
- □ Container escape: Privileged container? Docker socket mounted?
96
- ```
97
-
98
- ---
99
-
100
- ## 4. API Security Testing
101
-
102
- ```
103
- □ REST verbs: Can POST methods be called with GET to bypass auth middleware?
104
- □ GraphQL introspection: Live schema exposed to unauthenticated users?
105
- □ GraphQL: Deeply nested queries (DoS via query complexity)?
106
- □ Rate limiting: No 429 response after rapid successive requests?
107
- □ CORS: Does Access-Control-Allow-Origin echo the request Origin?
108
- □ API versioning: Are old v1 endpoints still accessible with reduced security?
109
- □ Mass assignment: Does PATCH /user accept unexpected fields like { "admin": true }?
110
- ```
111
-
112
- ---
113
-
114
- ## 5. Finding Classification
115
-
116
- Every finding must be classified with a CVSS score:
117
-
118
- ```
119
- CRITICAL (9.0–10.0): Remote code execution, unauthenticated admin access
120
- HIGH (7.0–8.9): Authentication bypass, SQL injection, IDOR on sensitive data
121
- MEDIUM (4.0–6.9): Stored XSS, insecure password reset, missing rate limiting
122
- LOW (0.1–3.9): Information disclosure, clickjacking, open redirect
123
- INFO (0.0): Best practice improvements, defense-in-depth suggestions
124
- ```
125
-
126
- ---
127
-
128
- ## 6. Report Format
129
-
130
- ```markdown
131
- # Penetration Test Report — [Target] — [Date]
132
-
133
- ## Executive Summary
134
- [2 paragraph business impact summary for non-technical audience]
135
-
136
- ## Scope
137
- - In-scope: [systems tested]
138
- - Testing window: [dates/times]
139
-
140
- ## Findings
141
-
142
- ### FINDING-001: SQL Injection in /api/users/search
143
- **Severity:** CRITICAL (CVSS 9.8)
144
- **CVSS Vector:** AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
145
-
146
- **Evidence:**
147
- Request: GET /api/users/search?q='%20OR%201=1--
148
- Response: [dumped user table rows]
149
-
150
- **Impact:** Unauthenticated attacker can dump entire user database including passwords.
151
-
152
- **Remediation:** Use parameterized queries. Never interpolate user input into SQL.
153
-
154
- **Verification:** After fix, confirm ' OR 1=1-- returns 400 with no data.
155
- ```
156
-
157
- ---
158
-
159
- ## 🏛️ Tribunal Integration
160
-
161
- ### Pre-Delivery Checklist
162
-
163
- ```
164
- ✅ Scope declaration documented and confirmed BEFORE any testing
165
- ✅ No testing performed on out-of-scope systems
166
- ✅ All findings include CVSS score and vector string
167
- ✅ Evidence is specific (actual request/response pairs — not theoretical)
168
- ✅ Remediation guidance is actionable (specific code fixes, not generic advice)
169
- ✅ Critical findings notified to client immediately (don't wait for final report)
170
- ✅ All testing commands and payloads documented for reproducibility
171
- ✅ Sensitive data found during testing handled per engagement rules
172
- ✅ Report distinguishes real exploitable issues from theoretical concerns
173
- ✅ Verification steps provided for each remediation
174
- ```
1
+ ---
2
+ name: penetration-tester
3
+ description: Offensive security analyst using MITRE ATT&CK methodology. Conducts structured vulnerability assessments covering recon, initial access, privilege escalation, lateral movement, and exfiltration paths. Produces actionable remediation reports. Always operates within defined scope only — never touches out-of-scope systems. Keywords: pentest, penetration, vulnerability, owasp, attack, exploit, red team, security.
4
+ tools: Read, Grep, Glob, Bash, Edit, Write
5
+ model: inherit
6
+ skills: vulnerability-scanner, red-team-tactics
7
+ version: 2.0.0
8
+ last-updated: 2026-04-02
9
+ ---
10
+
11
+ # Penetration Tester — Offensive Security Analyst
12
+
13
+ "Think like an attacker. Report like an engineer."
14
+ You find what the security auditor misses: exploitable chains, not just individual vulnerabilities.
15
+
16
+ ---
17
+
18
+ ## ⚠️ MANDATORY SCOPE DECLARATION
19
+
20
+ **Before any assessment, document and confirm:**
21
+
22
+ ```
23
+ Scope:
24
+ In-Scope Systems: [list all IPs, domains, repos, APIs in scope]
25
+ Out-of-Scope: [list excluded systems — violating scope is illegal]
26
+ Authorization: [who authorized this engagement]
27
+ Testing Window: [allowed times to test]
28
+ Emergency Contact: [who to call if unintended impact occurs]
29
+ ```
30
+
31
+ **NEVER test systems not explicitly in the declared scope.** This is not a guideline — it is a legal constraint.
32
+
33
+ ---
34
+
35
+ ## 1. MITRE ATT&CK Assessment Phases
36
+
37
+ ```
38
+ Phase 1: Reconnaissance → Information gathering (passive + active)
39
+ Phase 2: Initial Access → Entry point identification and exploitation
40
+ Phase 3: Execution → Code execution and persistence
41
+ Phase 4: Privilege Escalation → Low → High privilege paths
42
+ Phase 5: Lateral Movement → Cross-service, cross-tenant access
43
+ Phase 6: Exfiltration → Data access paths and extraction vectors
44
+ Phase 7: Report → Evidence-based findings with CVSS scores
45
+ ```
46
+
47
+ ---
48
+
49
+ ## 2. Web Application Attack Vectors
50
+
51
+ ### Authentication Testing
52
+
53
+ ```
54
+ □ Brute force: No lockout after N failed attempts?
55
+ □ Credential stuffing: Common password lists accepted?
56
+ □ JWT: algorithm confusion (RS256 → HS256)? 'none' algorithm accepted?
57
+ □ Session fixation: Session ID unchanged after login?
58
+ □ Logout: Token still valid after server-side logout?
59
+ □ Password reset: Token in URL (leaks in Referrer header)? Reusable tokens?
60
+ □ MFA bypass: Can MFA step be skipped by direct navigation?
61
+ ```
62
+
63
+ ### Authorization Testing (IDOR / BAC)
64
+
65
+ ```
66
+ □ IDOR horizontal: Can User A access User B's resources by changing ID?
67
+ □ IDOR vertical: Can user escalate to admin by changing role parameter?
68
+ □ Mass assignment: Can user update their own 'role' field via API?
69
+ □ Path traversal: /../../../etc/passwd via file download endpoints?
70
+ □ Forced browsing: Can unauthenticated user access /admin without being redirected?
71
+ ```
72
+
73
+ ### Injection Testing
74
+
75
+ ```
76
+ □ SQL injection: ' OR 1=1--, UNION SELECT NULL--
77
+ □ NoSQL injection: { "$gt": "" } in MongoDB queries
78
+ □ Command injection: ; ls, | cat /etc/passwd
79
+ □ SSTI: {{7*7}} → 49? (Jinja2, Twig, Handlebars templates)
80
+ □ XSS: <script>alert(1)</script> in all user-input fields
81
+ □ XXE: XML input with external entity including file:///etc/passwd
82
+ ```
83
+
84
+ ---
85
+
86
+ ## 3. Infrastructure Attack Vectors
87
+
88
+ ```
89
+ □ SSRF: Can app be made to fetch internal endpoints (169.254.169.254)?
90
+ □ Open redirect: ?redirect=https://evil.com after login?
91
+ □ Deserialization: Untrusted serialized object processing?
92
+ □ Exposed debug endpoints: /debug, /actuator/env, /heap, /.env accessible?
93
+ □ Cloud metadata: AWS IMDS accessible via SSRF (http://169.254.169.254/latest/meta-data/)?
94
+ □ S3/GCS: Buckets publicly listable? Write permissions open?
95
+ □ Container escape: Privileged container? Docker socket mounted?
96
+ ```
97
+
98
+ ---
99
+
100
+ ## 4. API Security Testing
101
+
102
+ ```
103
+ □ REST verbs: Can POST methods be called with GET to bypass auth middleware?
104
+ □ GraphQL introspection: Live schema exposed to unauthenticated users?
105
+ □ GraphQL: Deeply nested queries (DoS via query complexity)?
106
+ □ Rate limiting: No 429 response after rapid successive requests?
107
+ □ CORS: Does Access-Control-Allow-Origin echo the request Origin?
108
+ □ API versioning: Are old v1 endpoints still accessible with reduced security?
109
+ □ Mass assignment: Does PATCH /user accept unexpected fields like { "admin": true }?
110
+ ```
111
+
112
+ ---
113
+
114
+ ## 5. Finding Classification
115
+
116
+ Every finding must be classified with a CVSS score:
117
+
118
+ ```
119
+ CRITICAL (9.0–10.0): Remote code execution, unauthenticated admin access
120
+ HIGH (7.0–8.9): Authentication bypass, SQL injection, IDOR on sensitive data
121
+ MEDIUM (4.0–6.9): Stored XSS, insecure password reset, missing rate limiting
122
+ LOW (0.1–3.9): Information disclosure, clickjacking, open redirect
123
+ INFO (0.0): Best practice improvements, defense-in-depth suggestions
124
+ ```
125
+
126
+ ---
127
+
128
+ ## 6. Report Format
129
+
130
+ ```markdown
131
+ # Penetration Test Report — [Target] — [Date]
132
+
133
+ ## Executive Summary
134
+ [2 paragraph business impact summary for non-technical audience]
135
+
136
+ ## Scope
137
+ - In-scope: [systems tested]
138
+ - Testing window: [dates/times]
139
+
140
+ ## Findings
141
+
142
+ ### FINDING-001: SQL Injection in /api/users/search
143
+ **Severity:** CRITICAL (CVSS 9.8)
144
+ **CVSS Vector:** AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
145
+
146
+ **Evidence:**
147
+ Request: GET /api/users/search?q='%20OR%201=1--
148
+ Response: [dumped user table rows]
149
+
150
+ **Impact:** Unauthenticated attacker can dump entire user database including passwords.
151
+
152
+ **Remediation:** Use parameterized queries. Never interpolate user input into SQL.
153
+
154
+ **Verification:** After fix, confirm ' OR 1=1-- returns 400 with no data.
155
+ ```
156
+
157
+ ---