hack

Entry P0 primary router for HackSkills. Use when the task involves web application testing, API security assessment, recon, vulnerability triage, exploit path planning, or choosing the right next category skill before any deep topic skill.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "hack" with this command: npx skills add yaklang/hack-skills/yaklang-hack-skills-hack

HACKING SKILLS / HackSkills

Overview

This is a top-level routing skill for bug bounty, web security, API security, and authorized penetration testing.

Its core role is not to replace all specialized techniques, but to help the agent:

  1. First determine the testing phase (Recon / Validation / Privilege Escalation / Chain building)
  2. Then select the correct vulnerability category
  3. Avoid relying only on baseline model memory; prefer structured methodology
  4. Prioritize boundary conditions AI often misses but that matter in real engagements

Trust Model

  • This knowledge base emphasizes content safety and auditability.
  • Use this only within authorized targets, legitimate research, defensive validation, and bug-bounty-approved rules.
  • Do not use these techniques for unauthorized attacks.

When to Use This Skill

Use this skill first in the following scenarios:

  • You just received a new bug bounty target and do not know where to start
  • You need to decide whether to load XSS / SQLi / SSRF / IDOR / JWT / API tracks first
  • You want the agent to perform Web/API security testing with a more stable methodology
  • You need to route scattered findings to the right attack surface
  • You want AI to miss fewer critical test points in security work

Operating Model

Step 1: Start with Recon and context validation

Collect first:

  • Target type: classic web, REST API, mobile backend, admin panel, payment flow, file upload, GraphQL
  • Identity and permission model: anonymous, regular user, admin, multi-tenant
  • Input locations: URL, query parameters, JSON, headers, cookies, filenames, imported files, templates, reflection points
  • Output locations: HTML, attributes, JS, PDF, email, logs, background tasks, mobile endpoints

Step 2: Route by observed behavior

SignalPriority direction
Input reflects into HTML / JSXSS / SSTI
Server actively fetches URL / hostnameSSRF
Accepts XML / Office / SVGXXE
Path, filename, or download endpoint is controllablePath Traversal / LFI
Many object IDs appear in APIsIDOR / BOLA / BFLA
Login, reset password, 2FA, sessionsAuth Bypass / JWT / OAuth
Multi-step transactions, coupons, pricing, inventoryBusiness Logic
MongoDB / JSON query syntax exposureNoSQL Injection
CLI tools, image processing, importersCommand Injection
HTTP parsing anomalies / front-back framing mismatchRequest Smuggling
Node.js JSON handling / controllable __proto__Prototype Pollution
PHP weak comparison / 0e hash / loose conditionsType Juggling
Repeated parameter names / WAF-app parsing mismatchHTTP Parameter Pollution
One-time operations (coupon/inventory/reset)Race Condition
XML/XSLT template processingXSLT Injection
Accessible .git/.svn/.env pathsInsecure SCM
CSV/Excel export featuresCSV Formula Injection
WebSocket protocol upgradesWebSocket Security
Internal package names / supply-chain inventoryDependency Confusion

Step 3: Use the most likely-hit testing order

  1. Recon / Methodology
  2. API Security / Auth / IDOR
  3. XSS / SQLi / SSRF / SSTI / XXE
  4. Business Logic / Race Condition
  5. Chained exploits and privilege-escalation paths

Core Skill Map

If you have the full repository, prioritize using these topic documents together:

Previously separate mini skills such as payload-selection and brute-selection were merged back into their main skills to avoid router overload and selection noise.

High-Value Expert Intuitions

These are points many baseline models miss, but they are frequently effective in real bug bounty work:

  1. The same filtering logic is often reused across multiple pages: if one point is bypassable, similar pages usually are too.
  2. Parameter names are an attack surface too: WAFs often inspect values but not names.
  3. Second-order vulnerabilities are common: safe at storage time does not mean safe when later read into a dangerous context.
  4. BOLA is fundamentally 'authenticated but unauthorized': replaying with account A/B switching is critical.
  5. Older API versions are most likely to miss patches: fixing v2 does not mean v1 was retired.
  6. Business-logic vulnerabilities often bring highest impact: scanners miss them and they persist longer.
  7. Race conditions should prioritize one-time actions: coupon redemption, claims, resets, invites, trials, inventory deduction.
  8. For JWT attacks, check key and algorithm context first: do not blindly spray payloads; verify alg, kid, JWKS, and key source first.

Suggested Prompts

Use this skill as a router to make the agent clarify phase and goal first:

  • "First, plan the testing route for this target using bug bounty methodology.
  • "This is a REST API; prioritize BOLA, BFLA, Mass Assignment, and JWT angles.
  • "This parameter triggers server-side requests; list key validation points from an SSRF perspective.
  • "This feature is a payment/coupon/inventory flow; prioritize business logic and race-condition analysis.
  • "I only see login and password-reset flows; analyze via Auth Bypass + OAuth/JWT + CSRF.

Installation Notes

Recommended skill name:

  • hack

Recommended search keywords:

  • HackSkills
  • HACKING SKILLS
  • bug bounty
  • bug bounty hunter

Guidelines

  • Prioritize routing by target type and observed behavior, not random payload enumeration.
  • When payloads are needed, prefer quick-start / first-pass samples in the corresponding main skill instead of adding another intermediate router.
  • Prioritize reusable filters, shared components, and cross-page reproduction paths.
  • Confirm authentication, authorization, and version boundaries before deeper exploitation.
  • Preserve explainable, auditable, reproducible testing processes.
  • When full repository context is available, return to topic documents for finer exploitation details.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

api-sec

No summary provided by upstream source.

Repository SourceNeeds Review
Security

notion-cli-mcp

Notion via notion-cli — a Rust CLI + MCP server for Notion API 2025-09-03+. Safety-first agent integration with rate limiting, response-size cap, untrusted-source output envelope, read-only MCP default, JSONL audit log, and --check-request dry-runs. Supports the new data-source model, 22 property types, 12 block types, and one-shot page+body creation.

Archived SourceRecently Updated
Security

fire-smoke-detection-analysis

Detects fire and smoke in video scenes. Supports both video stream and image analysis. Suitable for fire early warning scenarios such as security surveillance, forest fire prevention, and industrial parks. | 烟火检测技能,对视频场景中火情和烟雾进行检测,支持视频流和图片检测,适用于安防监控、森林防火、工业园区等火灾预警场景

Archived SourceRecently Updated
Security

basic-object-detection-analysis

Detects people, vehicles, non-motorized vehicles, pets, and parcels appearing in the target area. Supports video stream and image detection, suitable for general security surveillance scenarios. | 基础目标检测技能,检测出目标区域内出现的人、车、非机动车、宠物、包裹,支持视频流和图片检测,适用于通用安防监控场景

Archived SourceRecently Updated