api-security-tester

Execute end-to-end API security testing from attack-surface mapping through validated findings and remediation notes.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "api-security-tester" with this command: npx skills add 1ikeadragon/awesome-offsec-claude/1ikeadragon-awesome-offsec-claude-api-security-tester

API Security Tester

Purpose

Run a complete API assessment cycle with strong evidence discipline and predictable output.

Inputs

  • target_base_url
  • api_spec_or_collection
  • auth_context
  • engagement_rules

Standard Test Order

  1. Discovery and endpoint normalization.
  2. Auth and authorization checks.
  3. Input handling and injection checks.
  4. Workflow and state-machine abuse checks.
  5. Impact confirmation and verification.

Execution Workflow

Phase 1: Discovery

  • Build endpoint and trust map.
  • Confirm content types, schema validation, and versioning.
  • Identify sensitive operations and privileged paths.

Phase 2: Access Control

  • Test object-level access control.
  • Test function-level authorization by role.
  • Test tenant boundary isolation.

Phase 3: Input Abuse

  • Injection candidates by sink class.
  • Mass assignment on create/update.
  • Filter/operator abuse on search APIs.

Phase 4: Workflow Abuse

  • Bypass prerequisite steps.
  • Replay or reorder transitions.
  • Abuse bulk and async operations.

Phase 5: Verification

  • Independently confirm positives.
  • Capture remediation-relevant root cause.
  • Downgrade or dispute weak findings.

Minimum Test Matrix

CategoryRequired Assertions
Authenticationunauthenticated access rejected consistently
Authorizationforeign objects and privileged actions are blocked
Input validationmalformed and malicious payloads handled safely
Error handlingno internal leakage in error bodies
State transitionsinvalid transitions rejected
Rate limitingsensitive operations throttled

Output Contract

{
  "scope_summary": {},
  "test_log": [],
  "confirmed_vulnerabilities": [],
  "verification_notes": [],
  "remediation_guidance": []
}

Constraints

  • Keep tests reproducible and proportional.
  • Do not overclaim severity without business impact.

Quality Checklist

  • Coverage includes auth, authz, input, workflow.
  • Findings include clear exploit path.
  • Remediation ties to code/control failure.

Detailed Operator Notes

Reproducibility Standard

  • Replay each confirmed case in a fresh session.
  • Replay with at least one payload or transport variant.
  • Keep one negative control request for every positive claim.

False-Positive Controls

  • For timing signals, compare against matched control payloads.
  • For authz signals, verify with ownership-correct and ownership-incorrect objects.
  • For parser signals, verify semantic effect, not just error shape changes.

Severity Calibration Inputs

  • Required attacker privilege.
  • Cross-tenant or single-tenant impact.
  • Ability to automate at scale.
  • Degree of data sensitivity.

Reporting Rules

  • Include exact request signatures (method, path, key headers, payload hash).
  • Include verification run count and consistency notes.
  • Include why alternative explanations were rejected.

Conditional Decision Matrix

ConditionActionEvidence Requirement
Endpoint undocumented but reachableAdd to inventory and prioritize authz checksrequest/response baseline + auth behavior
Auth behavior inconsistent across methodsSplit tests by method and content typeper-method status + body signatures
Time-based anomaly onlyrun matched control timing seriesrepeated control/test timing traces
Object access differs by roleescalate to cross-tenant/cross-role checksrole-tagged replay proof
Validation differs by parserrun semantic-equivalent content-type testsparser-path differential evidence

Advanced Coverage Extensions

  1. Add negative-object tests for soft-deleted or archived resources.
  2. Add replay-window tests for idempotency and duplicate processing.
  3. Add bulk endpoint abuse tests for partial authorization failures.
  4. Add asynchronous job handoff checks for stale permission snapshots.
  5. Add pagination/filter abuse checks for hidden data exposure.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

javascript-surface-analyzer

No summary provided by upstream source.

Repository SourceNeeds Review
General

taint-flow-tracer

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

code-review-analyst

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

finding-chain-correlator

No summary provided by upstream source.

Repository SourceNeeds Review