·pentest-exploit-validation
!

pentest-exploit-validation

證明驅動的利用,具有 4 級證據系統、旁路窮舉協議、強制證據檢查表和嚴格的 EXPLOITED/POTENTIAL/FALSE_POSITIVE 分類。

27安裝·5熱度·@jd-opensource

安裝

$npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation

如何安裝 pentest-exploit-validation

透過命令列快速安裝 pentest-exploit-validation AI 技能到你的開發環境

  1. 開啟終端機: 開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等)
  2. 執行安裝指令: 複製並執行以下指令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation
  3. 驗證安裝: 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用

來源:jd-opensource/joysafeter。

SKILL.md

查看原文

Purpose Validate vulnerability findings through proof-driven exploitation using Shannon's 4-level evidence system. Consumes the exploitation queue from white-box code review, attempts structured exploitation with bypass exhaustion, collects mandatory evidence per vulnerability type, and classifies each finding as EXPLOITED, POTENTIAL, or FALSEPOSITIVE.

| L1 | Weakness identified in code but not confirmed exploitable | POTENTIAL | | L2 | Partial bypass achieved but full exploitation not demonstrated | POTENTIAL | | L3 | Vulnerability confirmed with reproducible evidence | EXPLOITED | | L4 | Critical impact demonstrated (data exfil, RCE, account takeover) | EXPLOITED CRITICAL |

| EXPLOITED | Reproducible proof with evidence: HTTP request/response, extracted data, or demonstrated impact | | POTENTIAL | Code-level weakness confirmed but exploitation blocked by defense-in-depth or environment constraints | | FALSEPOSITIVE | Taint analysis flagged but manual review confirms effective sanitization or unreachable code path |

可引用資訊

為搜尋與 AI 引用準備的穩定欄位與指令。

安裝指令
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation
分類
!安全工具
認證
收錄時間
2026-02-25
更新時間
2026-03-10

Browse more skills from jd-opensource/joysafeter

快速解答

什麼是 pentest-exploit-validation?

證明驅動的利用,具有 4 級證據系統、旁路窮舉協議、強制證據檢查表和嚴格的 EXPLOITED/POTENTIAL/FALSE_POSITIVE 分類。 來源:jd-opensource/joysafeter。

如何安裝 pentest-exploit-validation?

開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用

這個 Skill 的原始碼在哪?

https://github.com/jd-opensource/joysafeter