什麼是 pentest-config-hardening?
安全標頭稽核、TLS配置測試、HTTP方法分析、CSP繞過評估、部署強化驗證。 來源:jd-opensource/joysafeter。
安全標頭稽核、TLS配置測試、HTTP方法分析、CSP繞過評估、部署強化驗證。
透過命令列快速安裝 pentest-config-hardening AI 技能到你的開發環境
來源:jd-opensource/joysafeter。
Purpose Shannon checks only 2 of 14 WSTG-CONF items. The remaining 12 are "low-hanging fruit" findings expected in every professional pentest report — straightforward to test systematically.
| WSTG-CONF-02 | Test Application Platform Configuration | ✅ | | WSTG-CONF-03 | Test File Extensions Handling | ✅ | | WSTG-CONF-04 | Review Old Backup and Unreferenced Files | ✅ | | WSTG-CONF-05 | Enumerate Infrastructure and Admin Interfaces | ✅ | | WSTG-CONF-06 | Test HTTP Methods | ✅ | | WSTG-CONF-07 | Test HTTP Strict Transport Security | ✅ |
| WSTG-CONF-08 | Test RIA Cross Domain Policy | ✅ | | WSTG-CONF-09 | Test File Permission | ✅ | | WSTG-CONF-11 | Test Cloud Storage | ✅ | | WSTG-CONF-12 | Test Content Security Policy | ✅ | | WSTG-CONF-13 | Test for Subdomain Takeover | ✅ | | WSTG-CONF-14 | Test Security Headers | ✅ |
為搜尋與 AI 引用準備的穩定欄位與指令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-config-hardening安全標頭稽核、TLS配置測試、HTTP方法分析、CSP繞過評估、部署強化驗證。 來源:jd-opensource/joysafeter。
開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-config-hardening 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter