What is pentest-business-logic?
Business logic vulnerability testing — workflow bypass, payment manipulation, state machine abuse, and function limit circumvention per WSTG-BUSL. Source: jd-opensource/joysafeter.
Business logic vulnerability testing — workflow bypass, payment manipulation, state machine abuse, and function limit circumvention per WSTG-BUSL.
Quickly install pentest-business-logic AI skill to your development environment via command line
Source: jd-opensource/joysafeter.
Purpose Identify flaws in application workflow enforcement, business rule validation, and state machine integrity that cannot be found by taint analysis or pattern matching. These vulnerabilities require understanding intended behavior and finding deviations.
| WSTG-BUSL-01 | Test Business Logic Data Validation | ✅ | | WSTG-BUSL-02 | Test Ability to Forge Requests | ✅ | | WSTG-BUSL-03 | Test Integrity Checks | ✅ | | WSTG-BUSL-04 | Test for Process Timing | ✅ | | WSTG-BUSL-05 | Test Number of Times a Function Can Be Used Limits | ✅ | | WSTG-BUSL-06 | Testing for the Circumvention of Work Flows | ✅ |
| WSTG-BUSL-07 | Test Defenses Against Application Misuse | ✅ | | WSTG-BUSL-08 | Test Upload of Unexpected File Types | ✅ | | WSTG-BUSL-09 | Test Upload of Malicious Files | ✅ | | WSTG-BUSL-10 | Test Payment Functionality | ✅ |
Stable fields and commands for AI/search citations.
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-business-logicBusiness logic vulnerability testing — workflow bypass, payment manipulation, state machine abuse, and function limit circumvention per WSTG-BUSL. Source: jd-opensource/joysafeter.
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-business-logic Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw
https://github.com/jd-opensource/joysafeter