什么是 pentest-client-advanced?
高级客户端攻击 — CORS 错误配置、WebSocket 安全、点击劫持、postMessage 滥用、CSS 注入和浏览器存储漏洞。 来源:jd-opensource/joysafeter。
高级客户端攻击 — CORS 错误配置、WebSocket 安全、点击劫持、postMessage 滥用、CSS 注入和浏览器存储漏洞。
通过命令行快速安装 pentest-client-advanced AI 技能到你的开发环境
来源:jd-opensource/joysafeter。
Purpose Test advanced client-side attack surfaces beyond XSS. Six WSTG-CLNT items remain unchecked in Shannon's pipeline — these are distinct attack classes requiring different methodology than taint analysis.
| WSTG-CLNT-05 | CSS Injection | ✅ | | WSTG-CLNT-06 | Client-Side Resource Manipulation | ✅ | | WSTG-CLNT-07 | Cross-Origin Resource Sharing | ✅ | | WSTG-CLNT-09 | Clickjacking | ✅ | | WSTG-CLNT-10 | WebSocket Testing | ✅ | | WSTG-CLNT-11 | Web Messaging | ✅ |
| CORS Testing | CORScanner, curl, custom PoC pages | CORS misconfiguration detection | | WebSocket | websocket-client (Python), Burp WS | WebSocket hijacking and injection | | Clickjacking | custom HTML iframes, Playwright | UI redressing PoC construction | | Browser Automation | Playwright, Puppeteer | Automated client-side attack verification |
为搜索与 AI 引用准备的稳定字段与命令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-client-advanced高级客户端攻击 — CORS 错误配置、WebSocket 安全、点击劫持、postMessage 滥用、CSS 注入和浏览器存储漏洞。 来源:jd-opensource/joysafeter。
打开你的终端或命令行工具(如 Terminal、iTerm、Windows Terminal 等) 复制并运行以下命令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-client-advanced 安装完成后,技能将自动配置到你的 AI 编程环境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter