什么是 pentest-exploit-validation?
证明驱动的利用,具有 4 级证据系统、旁路穷举协议、强制证据检查表和严格的 EXPLOITED/POTENTIAL/FALSE_POSITIVE 分类。 来源:jd-opensource/joysafeter。
证明驱动的利用,具有 4 级证据系统、旁路穷举协议、强制证据检查表和严格的 EXPLOITED/POTENTIAL/FALSE_POSITIVE 分类。
通过命令行快速安装 pentest-exploit-validation AI 技能到你的开发环境
来源:jd-opensource/joysafeter。
Purpose Validate vulnerability findings through proof-driven exploitation using Shannon's 4-level evidence system. Consumes the exploitation queue from white-box code review, attempts structured exploitation with bypass exhaustion, collects mandatory evidence per vulnerability type, and classifies each finding as EXPLOITED, POTENTIAL, or FALSEPOSITIVE.
| L1 | Weakness identified in code but not confirmed exploitable | POTENTIAL | | L2 | Partial bypass achieved but full exploitation not demonstrated | POTENTIAL | | L3 | Vulnerability confirmed with reproducible evidence | EXPLOITED | | L4 | Critical impact demonstrated (data exfil, RCE, account takeover) | EXPLOITED CRITICAL |
| EXPLOITED | Reproducible proof with evidence: HTTP request/response, extracted data, or demonstrated impact | | POTENTIAL | Code-level weakness confirmed but exploitation blocked by defense-in-depth or environment constraints | | FALSEPOSITIVE | Taint analysis flagged but manual review confirms effective sanitization or unreachable code path |
为搜索与 AI 引用准备的稳定字段与命令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation证明驱动的利用,具有 4 级证据系统、旁路穷举协议、强制证据检查表和严格的 EXPLOITED/POTENTIAL/FALSE_POSITIVE 分类。 来源:jd-opensource/joysafeter。
打开你的终端或命令行工具(如 Terminal、iTerm、Windows Terminal 等) 复制并运行以下命令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-exploit-validation 安装完成后,技能将自动配置到你的 AI 编程环境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter