什麼是 pentest-client-advanced?
進階客戶端攻擊 — CORS 錯誤配置、WebSocket 安全性、點擊劫持、postMessage 濫用、CSS 注入和瀏覽器儲存漏洞。 來源:jd-opensource/joysafeter。
進階客戶端攻擊 — CORS 錯誤配置、WebSocket 安全性、點擊劫持、postMessage 濫用、CSS 注入和瀏覽器儲存漏洞。
透過命令列快速安裝 pentest-client-advanced AI 技能到你的開發環境
來源:jd-opensource/joysafeter。
Purpose Test advanced client-side attack surfaces beyond XSS. Six WSTG-CLNT items remain unchecked in Shannon's pipeline — these are distinct attack classes requiring different methodology than taint analysis.
| WSTG-CLNT-05 | CSS Injection | ✅ | | WSTG-CLNT-06 | Client-Side Resource Manipulation | ✅ | | WSTG-CLNT-07 | Cross-Origin Resource Sharing | ✅ | | WSTG-CLNT-09 | Clickjacking | ✅ | | WSTG-CLNT-10 | WebSocket Testing | ✅ | | WSTG-CLNT-11 | Web Messaging | ✅ |
| CORS Testing | CORScanner, curl, custom PoC pages | CORS misconfiguration detection | | WebSocket | websocket-client (Python), Burp WS | WebSocket hijacking and injection | | Clickjacking | custom HTML iframes, Playwright | UI redressing PoC construction | | Browser Automation | Playwright, Puppeteer | Automated client-side attack verification |
為搜尋與 AI 引用準備的穩定欄位與指令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-client-advanced進階客戶端攻擊 — CORS 錯誤配置、WebSocket 安全性、點擊劫持、postMessage 濫用、CSS 注入和瀏覽器儲存漏洞。 來源:jd-opensource/joysafeter。
開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-client-advanced 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter