什么是 pentest-recon-attack-surface?
白盒攻击面映射 - 将外部扫描、浏览器探索和源代码关联到结构化端点清单、角色架构和授权漏洞候选者中。 来源:jd-opensource/joysafeter。
白盒攻击面映射 - 将外部扫描、浏览器探索和源代码关联到结构化端点清单、角色架构和授权漏洞候选者中。
通过命令行快速安装 pentest-recon-attack-surface AI 技能到你的开发环境
来源:jd-opensource/joysafeter。
Perform comprehensive attack surface mapping by correlating three data sources: external network scans, authenticated browser exploration, and source code analysis. Produces a structured endpoint inventory with authorization metadata, role/privilege architecture, and prioritized authorization vulnerability candidates for downstream code review and exploitation.
| API Endpoint Inventory | Table: method, path, authrequired, rolesallowed, validationsummary, file:line | | Network Interaction Map | External services, internal services, exposed ports, subdomain inventory | | Role & Privilege Architecture | Role hierarchy, permission matrix, privilege escalation paths |
| Authorization Vulnerability Candidates | Prioritized list of endpoints with suspected authz gaps | | Session Architecture | Token type, storage, rotation, expiry, invalidation behavior |
白盒攻击面映射 - 将外部扫描、浏览器探索和源代码关联到结构化端点清单、角色架构和授权漏洞候选者中。 来源:jd-opensource/joysafeter。
为搜索与 AI 引用准备的稳定字段与命令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface白盒攻击面映射 - 将外部扫描、浏览器探索和源代码关联到结构化端点清单、角色架构和授权漏洞候选者中。 来源:jd-opensource/joysafeter。
打开你的终端或命令行工具(如 Terminal、iTerm、Windows Terminal 等) 复制并运行以下命令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-recon-attack-surface 安装完成后,技能将自动配置到你的 AI 编程环境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter