What is pentest-config-hardening?
Security header auditing, TLS configuration testing, HTTP method analysis, CSP bypass assessment, and deployment hardening verification. Source: jd-opensource/joysafeter.
Security header auditing, TLS configuration testing, HTTP method analysis, CSP bypass assessment, and deployment hardening verification.
Quickly install pentest-config-hardening AI skill to your development environment via command line
Source: jd-opensource/joysafeter.
Purpose Shannon checks only 2 of 14 WSTG-CONF items. The remaining 12 are "low-hanging fruit" findings expected in every professional pentest report — straightforward to test systematically.
| WSTG-CONF-02 | Test Application Platform Configuration | ✅ | | WSTG-CONF-03 | Test File Extensions Handling | ✅ | | WSTG-CONF-04 | Review Old Backup and Unreferenced Files | ✅ | | WSTG-CONF-05 | Enumerate Infrastructure and Admin Interfaces | ✅ | | WSTG-CONF-06 | Test HTTP Methods | ✅ | | WSTG-CONF-07 | Test HTTP Strict Transport Security | ✅ |
| WSTG-CONF-08 | Test RIA Cross Domain Policy | ✅ | | WSTG-CONF-09 | Test File Permission | ✅ | | WSTG-CONF-11 | Test Cloud Storage | ✅ | | WSTG-CONF-12 | Test Content Security Policy | ✅ | | WSTG-CONF-13 | Test for Subdomain Takeover | ✅ | | WSTG-CONF-14 | Test Security Headers | ✅ |
Stable fields and commands for AI/search citations.
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-config-hardeningSecurity header auditing, TLS configuration testing, HTTP method analysis, CSP bypass assessment, and deployment hardening verification. Source: jd-opensource/joysafeter.
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-config-hardening Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw
https://github.com/jd-opensource/joysafeter