·pentest-recon-attack-surface
!

pentest-recon-attack-surface

White-box attack surface mapping — correlate external scans, browser exploration, and source code into structured endpoint inventory, role architecture, and authorization vulnerability candidates.

19Installs·1Trend·@jd-opensource

Installation

$npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface

How to Install pentest-recon-attack-surface

Quickly install pentest-recon-attack-surface AI skill to your development environment via command line

  1. Open Terminal: Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.)
  2. Run Installation Command: Copy and run this command: npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface
  3. Verify Installation: Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Source: jd-opensource/joysafeter.

SKILL.md

View raw

Perform comprehensive attack surface mapping by correlating three data sources: external network scans, authenticated browser exploration, and source code analysis. Produces a structured endpoint inventory with authorization metadata, role/privilege architecture, and prioritized authorization vulnerability candidates for downstream code review and exploitation.

| API Endpoint Inventory | Table: method, path, authrequired, rolesallowed, validationsummary, file:line | | Network Interaction Map | External services, internal services, exposed ports, subdomain inventory | | Role & Privilege Architecture | Role hierarchy, permission matrix, privilege escalation paths |

| Authorization Vulnerability Candidates | Prioritized list of endpoints with suspected authz gaps | | Session Architecture | Token type, storage, rotation, expiry, invalidation behavior |

White-box attack surface mapping — correlate external scans, browser exploration, and source code into structured endpoint inventory, role architecture, and authorization vulnerability candidates. Source: jd-opensource/joysafeter.

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface
Category
!Security
Verified
First Seen
2026-02-26
Updated
2026-03-10

Browse more skills from jd-opensource/joysafeter

Quick answers

What is pentest-recon-attack-surface?

White-box attack surface mapping — correlate external scans, browser exploration, and source code into structured endpoint inventory, role architecture, and authorization vulnerability candidates. Source: jd-opensource/joysafeter.

How do I install pentest-recon-attack-surface?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Where is the source repository?

https://github.com/jd-opensource/joysafeter