Files
antigravity-skills-reference/skills/web-security-testing/SKILL.md
sck_0 aa71e76eb9 chore: release 6.5.0 - Community & Experience
- Add date_added to all 950+ skills for complete tracking
- Update version to 6.5.0 in package.json and README
- Regenerate all indexes and catalog
- Sync all generated files

Features from merged PR #150:
- Stars/Upvotes system for community-driven discovery
- Auto-update mechanism via START_APP.bat
- Interactive Prompt Builder
- Date tracking badges
- Smart auto-categorization

All skills validated and indexed.

Made-with: Cursor
2026-02-27 09:19:41 +01:00

184 lines
3.9 KiB
Markdown

---
name: web-security-testing
description: "Web application security testing workflow for OWASP Top 10 vulnerabilities including injection, XSS, authentication flaws, and access control issues."
category: granular-workflow-bundle
risk: safe
source: personal
date_added: "2026-02-27"
---
# Web Security Testing Workflow
## Overview
Specialized workflow for testing web applications against OWASP Top 10 vulnerabilities including injection attacks, XSS, broken authentication, and access control issues.
## When to Use This Workflow
Use this workflow when:
- Testing web application security
- Performing OWASP Top 10 assessment
- Conducting penetration tests
- Validating security controls
- Bug bounty hunting
## Workflow Phases
### Phase 1: Reconnaissance
#### Skills to Invoke
- `scanning-tools` - Security scanning
- `top-web-vulnerabilities` - OWASP knowledge
#### Actions
1. Map application surface
2. Identify technologies
3. Discover endpoints
4. Find subdomains
5. Document findings
#### Copy-Paste Prompts
```
Use @scanning-tools to perform web application reconnaissance
```
### Phase 2: Injection Testing
#### Skills to Invoke
- `sql-injection-testing` - SQL injection
- `sqlmap-database-pentesting` - SQLMap
#### Actions
1. Test SQL injection
2. Test NoSQL injection
3. Test command injection
4. Test LDAP injection
5. Document vulnerabilities
#### Copy-Paste Prompts
```
Use @sql-injection-testing to test for SQL injection
```
```
Use @sqlmap-database-pentesting to automate SQL injection testing
```
### Phase 3: XSS Testing
#### Skills to Invoke
- `xss-html-injection` - XSS testing
- `html-injection-testing` - HTML injection
#### Actions
1. Test reflected XSS
2. Test stored XSS
3. Test DOM-based XSS
4. Test XSS filters
5. Document findings
#### Copy-Paste Prompts
```
Use @xss-html-injection to test for cross-site scripting
```
### Phase 4: Authentication Testing
#### Skills to Invoke
- `broken-authentication` - Authentication testing
#### Actions
1. Test credential stuffing
2. Test brute force protection
3. Test session management
4. Test password policies
5. Test MFA implementation
#### Copy-Paste Prompts
```
Use @broken-authentication to test authentication security
```
### Phase 5: Access Control Testing
#### Skills to Invoke
- `idor-testing` - IDOR testing
- `file-path-traversal` - Path traversal
#### Actions
1. Test vertical privilege escalation
2. Test horizontal privilege escalation
3. Test IDOR vulnerabilities
4. Test directory traversal
5. Test unauthorized access
#### Copy-Paste Prompts
```
Use @idor-testing to test for insecure direct object references
```
```
Use @file-path-traversal to test for path traversal
```
### Phase 6: Security Headers
#### Skills to Invoke
- `api-security-best-practices` - Security headers
#### Actions
1. Check CSP implementation
2. Verify HSTS configuration
3. Test X-Frame-Options
4. Check X-Content-Type-Options
5. Verify referrer policy
#### Copy-Paste Prompts
```
Use @api-security-best-practices to audit security headers
```
### Phase 7: Reporting
#### Skills to Invoke
- `reporting-standards` - Security reporting
#### Actions
1. Document vulnerabilities
2. Assess risk levels
3. Provide remediation
4. Create proof of concept
5. Generate report
#### Copy-Paste Prompts
```
Use @reporting-standards to create security report
```
## OWASP Top 10 Checklist
- [ ] A01: Broken Access Control
- [ ] A02: Cryptographic Failures
- [ ] A03: Injection
- [ ] A04: Insecure Design
- [ ] A05: Security Misconfiguration
- [ ] A06: Vulnerable Components
- [ ] A07: Authentication Failures
- [ ] A08: Software/Data Integrity
- [ ] A09: Logging/Monitoring
- [ ] A10: SSRF
## Quality Gates
- [ ] All OWASP Top 10 tested
- [ ] Vulnerabilities documented
- [ ] Proof of concepts captured
- [ ] Remediation provided
- [ ] Report generated
## Related Workflow Bundles
- `security-audit` - Security auditing
- `api-security-testing` - API security
- `wordpress-security` - WordPress security