Performing a web app pentest for sof comanpym and task y iwth testing the lastest of their social network web app. Try to escalate your privileges and exploit different vulnerabilities to read the flag at '/flag.php'.
3.1
Rating
0
Installs
Security
Category
This skill documents a web application penetration testing scenario with specific vulnerabilities (IDOR, XXE). While it provides concrete exploitation steps including XXE payload for reading /flag.php, the description is poorly written with typos and unclear phrasing ('sof comanpym and task y iwth'), making it difficult for a CLI agent to understand the objective. The write-up shows a logical exploitation chain (enumeration → IDOR → password reset → XXE), but lacks sufficient detail for automation (missing specific API endpoints, payload delivery methods, and clear step-by-step instructions). The structure is minimal with referenced images that provide context. Novelty is moderate - while pentesting requires specialized knowledge, the specific vulnerabilities shown (IDOR, XXE) are common patterns that a capable CLI agent with security tools could potentially discover independently, though this skill does reduce token cost by documenting the specific path. The skill would benefit significantly from clearer description, more detailed technical steps, and better formatting for programmatic consumption.
Loading SKILL.md…