api-security-tester
SKILL.md
API Security Tester
Purpose
Run a complete API assessment cycle with strong evidence discipline and predictable output.
Inputs
target_base_urlapi_spec_or_collectionauth_contextengagement_rules
Standard Test Order
- Discovery and endpoint normalization.
- Auth and authorization checks.
- Input handling and injection checks.
- Workflow and state-machine abuse checks.
- Impact confirmation and verification.
Execution Workflow
Phase 1: Discovery
- Build endpoint and trust map.
- Confirm content types, schema validation, and versioning.
- Identify sensitive operations and privileged paths.
Phase 2: Access Control
- Test object-level access control.
- Test function-level authorization by role.
- Test tenant boundary isolation.
Phase 3: Input Abuse
- Injection candidates by sink class.
- Mass assignment on create/update.
- Filter/operator abuse on search APIs.
Phase 4: Workflow Abuse
- Bypass prerequisite steps.
- Replay or reorder transitions.
- Abuse bulk and async operations.
Phase 5: Verification
- Independently confirm positives.
- Capture remediation-relevant root cause.
- Downgrade or dispute weak findings.
Minimum Test Matrix
| Category | Required Assertions |
|---|---|
| Authentication | unauthenticated access rejected consistently |
| Authorization | foreign objects and privileged actions are blocked |
| Input validation | malformed and malicious payloads handled safely |
| Error handling | no internal leakage in error bodies |
| State transitions | invalid transitions rejected |
| Rate limiting | sensitive operations throttled |
Output Contract
{
"scope_summary": {},
"test_log": [],
"confirmed_vulnerabilities": [],
"verification_notes": [],
"remediation_guidance": []
}
Constraints
- Keep tests reproducible and proportional.
- Do not overclaim severity without business impact.
Quality Checklist
- Coverage includes auth, authz, input, workflow.
- Findings include clear exploit path.
- Remediation ties to code/control failure.
Detailed Operator Notes
Reproducibility Standard
- Replay each confirmed case in a fresh session.
- Replay with at least one payload or transport variant.
- Keep one negative control request for every positive claim.
False-Positive Controls
- For timing signals, compare against matched control payloads.
- For authz signals, verify with ownership-correct and ownership-incorrect objects.
- For parser signals, verify semantic effect, not just error shape changes.
Severity Calibration Inputs
- Required attacker privilege.
- Cross-tenant or single-tenant impact.
- Ability to automate at scale.
- Degree of data sensitivity.
Reporting Rules
- Include exact request signatures (method, path, key headers, payload hash).
- Include verification run count and consistency notes.
- Include why alternative explanations were rejected.
Conditional Decision Matrix
| Condition | Action | Evidence Requirement |
|---|---|---|
| Endpoint undocumented but reachable | Add to inventory and prioritize authz checks | request/response baseline + auth behavior |
| Auth behavior inconsistent across methods | Split tests by method and content type | per-method status + body signatures |
| Time-based anomaly only | run matched control timing series | repeated control/test timing traces |
| Object access differs by role | escalate to cross-tenant/cross-role checks | role-tagged replay proof |
| Validation differs by parser | run semantic-equivalent content-type tests | parser-path differential evidence |
Advanced Coverage Extensions
- Add negative-object tests for soft-deleted or archived resources.
- Add replay-window tests for idempotency and duplicate processing.
- Add bulk endpoint abuse tests for partial authorization failures.
- Add asynchronous job handoff checks for stale permission snapshots.
- Add pagination/filter abuse checks for hidden data exposure.
Weekly Installs
3
Repository
1ikeadragon/awe…c-claudeGitHub Stars
4
First Seen
14 days ago
Security Audits
Installed on
opencode3
claude-code3
github-copilot3
codex3
amp3
cline3