pentest-exploit-validation
OfficialProof-driven vulnerability validation.
Education & Research#validation#evidence#exploitation#cybersecurity#quality-assurance#workflows#pentest
Authorjd-opensource
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill provides a structured framework to validate security findings through proof-driven exploitation, using a four-level evidence system to differentiate between potential and confirmed issues.
Core Features & Use Cases
- Four-level evidence model guides classification (POTENTIAL, EXPLOITED, EXPLOITED CRITICAL) with reproducible proof.
- Queue-driven validation ingests exploitation queues from white-box reviews and sequences injections, XSS, SSRF, and related vectors for consolidated assessment.
- Mandatory evidence templates drive consistent collection, documentation, and audit-ready reporting across findings and workflows.
- Structured workflows define type-specific validation paths and reference workflows to ensure repeatable results in security testing programs.
Quick Start
Load a finding from the exploitation queue and start the four-level evidence validation workflow to obtain reproducible proof and classification.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: pentest-exploit-validation Download link: https://github.com/jd-opensource/JoySafeter/archive/main.zip#pentest-exploit-validation Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.