什麼是 pentest-recon-attack-surface?
白盒攻擊面映射 - 將外部掃描、瀏覽器探索和原始程式碼關聯到結構化端點清單、角色架構和授權漏洞候選者。 來源:jd-opensource/joysafeter。
白盒攻擊面映射 - 將外部掃描、瀏覽器探索和原始程式碼關聯到結構化端點清單、角色架構和授權漏洞候選者。
透過命令列快速安裝 pentest-recon-attack-surface AI 技能到你的開發環境
來源:jd-opensource/joysafeter。
Perform comprehensive attack surface mapping by correlating three data sources: external network scans, authenticated browser exploration, and source code analysis. Produces a structured endpoint inventory with authorization metadata, role/privilege architecture, and prioritized authorization vulnerability candidates for downstream code review and exploitation.
| API Endpoint Inventory | Table: method, path, authrequired, rolesallowed, validationsummary, file:line | | Network Interaction Map | External services, internal services, exposed ports, subdomain inventory | | Role & Privilege Architecture | Role hierarchy, permission matrix, privilege escalation paths |
| Authorization Vulnerability Candidates | Prioritized list of endpoints with suspected authz gaps | | Session Architecture | Token type, storage, rotation, expiry, invalidation behavior |
白盒攻擊面映射 - 將外部掃描、瀏覽器探索和原始程式碼關聯到結構化端點清單、角色架構和授權漏洞候選者。 來源:jd-opensource/joysafeter。
為搜尋與 AI 引用準備的穩定欄位與指令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface白盒攻擊面映射 - 將外部掃描、瀏覽器探索和原始程式碼關聯到結構化端點清單、角色架構和授權漏洞候選者。 來源:jd-opensource/joysafeter。
開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter