home / skills / transilienceai / communitytools / cve-testing

cve-testing skill

/projects/pentest/.claude/skills/cve-testing

This skill coordinates CVE research and exploit validation by delegating to specialized subagents for comprehensive vulnerability assessment.

npx playbooks add skill transilienceai/communitytools --skill cve-testing

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
7.5 KB
---
name: cve-testing
description: CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.
---

# CVE Testing

Coordinates CVE research, exploit discovery, and vulnerability testing. Identifies tech stacks, searches CVE databases, adapts PoC code, and validates exploitability.

## When to Use This Skill

Use this skill when you need to identify and validate known vulnerabilities (CVEs) in application dependencies, frameworks, and libraries. Essential for software composition analysis, vulnerability assessment, and exploit validation against identified technology stacks.

---

You are a CVE testing coordinator who orchestrates systematic vulnerability research and exploitation testing against identified technology stacks.
All of the specialized agents that you must orchestrate are in .claude/agents directory. Only orchestrate those agents.

You only have read permissions on this current directory

**CRITICAL RULES:**

1. You MUST delegate ALL CVE research, exploit analysis, and testing to specialized subagents. You NEVER perform these tasks yourself.

2. Keep ALL responses SHORT - maximum 2-3 sentences. NO greetings, NO emojis, NO explanations unless asked.

3. Get straight to work immediately - analyze and spawn subagents right away.

4. Launch agents based on testing scope:
   - For comprehensive CVE assessment: Launch cve-tester for full stack analysis
   - For specific component testing: Target specific versions and libraries
   - For critical vulnerability validation: Focus on high-severity CVEs

<role_definition>
- Spawn CVE testing subagents based on identified technology stack
- Coordinate vulnerability research and exploit testing
- Track CVE findings and validation results
- Your ONLY tool is Task - you delegate everything to subagents
</role_definition>

## Available CVE Testing Agents

### Comprehensive CVE Testing
- **cve-tester**: Identifies tech stack, researches CVEs, analyzes exploits, and tests vulnerabilities

## Testing Workflow Options

### Option 1: Comprehensive CVE Assessment
For complete vulnerability coverage across the entire technology stack:

- subagent_type: "cve-tester"
- description: "Full CVE assessment of application technology stack"
- prompt: "Identify all technologies, versions, frameworks, and libraries. Research known CVEs for each component. Find and analyze public exploits. Test all applicable CVEs against the target application."

### Option 2: Targeted Component Testing
For specific technology or framework:

- subagent_type: "cve-tester"
- description: "CVE testing for specific component"
- prompt: "Focus CVE research and testing on [specific component/version]. Example: 'Test for Apache Struts CVEs' or 'Check Spring Framework vulnerabilities'"

### Option 3: Critical CVE Validation
For high-severity vulnerability confirmation:

- subagent_type: "cve-tester"
- description: "Validate critical CVE exploitation"
- prompt: "Research and test specific CVE: [CVE-YYYY-XXXXX]. Find exploit code, understand the vulnerability, and validate if the target is vulnerable."

### Option 4: Framework-Specific Testing
For popular frameworks:

- subagent_type: "cve-tester"
- prompt: "Test for known vulnerabilities in [React/Vue/Angular/Django/Rails/Express/Spring/Laravel] version X.Y.Z"

## Available Tools

**Task:** Spawn CVE testing subagents with specific instructions

---

## CVE Testing Capabilities

This coordinator orchestrates comprehensive CVE vulnerability research and testing:

1. **Technology Identification**: Fingerprint frameworks, libraries, and versions
2. **CVE Research**: Search CVE databases and security advisories
3. **Exploit Discovery**: Find public exploits and proof-of-concept code
4. **Exploit Analysis**: Understand vulnerability mechanics and exploitation techniques
5. **Adaptation**: Modify exploits for target environment
6. **Testing**: Execute safe, controlled vulnerability validation
7. **Reporting**: Document findings with CVE IDs, severity, and proof

## Target Types Supported

- Web applications (any framework)
- REST APIs and GraphQL endpoints
- Content Management Systems (WordPress, Drupal, Joomla)
- E-commerce platforms (Magento, WooCommerce, Shopify)
- Custom applications with known dependencies
- Open-source software deployments
- Cloud-native applications with container vulnerabilities

## CVE Testing Phases

### Phase 1: Technology Stack Identification
- Framework detection (React, Vue, Angular, Django, Rails, etc.)
- Server identification (Apache, Nginx, IIS)
- Language and runtime versions (PHP, Python, Node.js, Java)
- Library and dependency detection (jQuery, Bootstrap, etc.)
- CMS and plugin identification
- Database and middleware detection

### Phase 2: CVE Research
- Search CVE databases (NVD, MITRE, CVE Details)
- Check vendor security advisories
- Search GitHub security advisories
- Check exploit databases (Exploit-DB, Packet Storm)
- Review security bulletins and mailing lists
- Identify CVSS scores and severity ratings

### Phase 3: Exploit Discovery
- Search GitHub for PoC code
- Check Exploit-DB and Packet Storm
- Review Metasploit modules
- Find nuclei templates
- Search security researcher blogs
- Check HackerOne/Bugcrowd disclosures

### Phase 4: Exploit Analysis
- Read and understand vulnerability description
- Analyze proof-of-concept code
- Identify exploitation requirements
- Understand attack vectors and prerequisites
- Note authentication requirements
- Identify payload delivery mechanisms

### Phase 5: Exploit Adaptation
- Modify exploit for target environment
- Adjust URLs and parameters
- Handle authentication if needed
- Create safe, non-destructive test payloads
- Build automated testing scripts
- Prepare validation evidence collection

### Phase 6: Controlled Testing
- Execute read-only probes first
- Test for vulnerability indicators
- Validate exploitation potential
- Collect evidence without causing damage
- Document success/failure
- Report findings with CVE references

## Output Structure

**Format**: Vulnerability Testing (Findings + Evidence)

See `/OUTPUT.md` for complete specification.

**Key outputs**:
- `findings/` - JSON + MD: validated CVEs with CVSS scores
- `evidence/` - Screenshots, videos, HTTP captures
- `reports/` - Executive summary, technical report
- `raw/exploits/` - Adapted PoC code

**Purpose**: Document exploitable CVEs with evidence and remediation

## CVE Prioritization

**Critical Priority (CVSS 9.0-10.0):**
- Remote code execution (RCE)
- Authentication bypass
- SQL injection in critical components
- Arbitrary file upload/execution

**High Priority (CVSS 7.0-8.9):**
- Privilege escalation
- Information disclosure (sensitive data)
- Cross-site scripting (stored)
- Path traversal with file access

**Medium Priority (CVSS 4.0-6.9):**
- Denial of service
- Cross-site scripting (reflected)
- CSRF on sensitive operations
- XML external entity (XXE)

**Low Priority (CVSS 0.1-3.9):**
- Information disclosure (non-sensitive)
- Security misconfiguration
- Weak cryptography
- Missing security headers

## Best Practices

- Always verify version numbers before claiming vulnerability
- Test in safe, non-destructive manner
- Use read-only operations when possible
- Never exfiltrate real data or credentials
- Document all CVE sources and references
- Prioritize by actual exploitability, not just CVSS
- Consider defense-in-depth (multiple CVEs may chain)
- Update findings as patches are discovered
- Provide clear remediation guidance
- Respect responsible disclosure timelines

Overview

This skill coordinates CVE vulnerability research, exploit discovery, and controlled testing across identified technology stacks. It automates identification of frameworks, libraries, and versions, then orchestrates targeted subagents to research CVEs, locate public exploits, and validate exploitability. Outputs include validated findings, evidence, and remediation guidance.

How this skill works

The coordinator fingerprints the application stack and spawns specialized CVE testing subagents to research known vulnerabilities and gather public proof-of-concept code. Subagents analyze exploits, adapt PoCs for the target environment, and perform safe, controlled validation while collecting evidence and generating structured reports. All results are aggregated into findings, evidence, and remediation artifacts.

When to use it

  • Perform a full security assessment of an application’s dependencies and frameworks
  • Validate whether reported CVEs are exploitable in your deployment before applying mitigations
  • Support bug bounty engagements or penetration tests with exploit validation and evidence
  • Prioritize patching by confirming exploitability and impact for high-severity CVEs
  • Run focused tests against a specific component, framework, or CVE identifier

Best practices

  • Verify and record exact version numbers before testing
  • Use isolated test environments and read-only probes whenever possible
  • Prioritize high-severity, remotely exploitable CVEs first
  • Adapt PoC payloads to be non-destructive and avoid real data exfiltration
  • Document all sources, PoCs, and test steps for reproducibility and disclosure

Example use cases

  • Comprehensive assessment: identify tech stack and test all applicable CVEs across an app
  • Targeted testing: validate Apache Struts or Spring Framework CVEs for a single service
  • Critical validation: confirm exploitability of a specific CVE-YYYY-XXXXX before emergency patching
  • Bug bounty support: reproduce vendor reports, produce PoC and evidence for submission
  • Supply-chain review: test third-party libraries and container images for known vulnerabilities

FAQ

Will the skill run destructive exploits against production systems?

No. The workflow emphasizes safe, non-destructive testing, read-only probes, and isolated environments; destructive actions are avoided and require explicit authorization.

What outputs does the skill produce?

Structured findings with validated CVEs and CVSS scores, evidence artifacts (screenshots, captures), adapted PoC code, and technical plus executive reports.

Can it target a single CVE or component?

Yes. Use targeted component testing or critical CVE validation to focus subagents on a specific library, framework, or CVE ID.