pentest-business-logic-abuse
SKILL.md
Business Logic Abuse
Activation Triggers (Positive)
business logicworkflow bypassrace conditionstate transitionreplayquota abuseconfused deputydelegated execution
Exclusion Triggers (Negative)
payload fuzzing onlyendpoint recon onlyreport polishing only
Output Schema
- Workflow model:
step,required controls,bypass hypothesis - Abuse sequence: ordered requests/events with timing notes
- Impact proof: unauthorized state change and resulting capability
Instructions
- Model intended state transitions before adversarial testing.
- Identify assumptions in sequencing, concurrency, and cross-system coordination.
- Execute minimal abuse sequences that challenge those assumptions.
- Confirm impact through observable unauthorized state or action outcomes.
- Validate whether fixes require control relocation, not only input filtering.
- Hand off only confirmed primitives for exploit execution.
Should Do
- Treat logic abuse as system-behavior testing, not payload-only testing.
- Use time-aware evidence for race and replay cases.
- Include reversible test design for stateful systems.
Should Not Do
- Do not report logic flaws without demonstrated unauthorized effect.
- Do not overuse concurrency that risks stability.
- Do not substitute theoretical abuse paths for confirmed execution evidence.
Weekly Installs
13
Repository
crtvrffnrt/skillsFirst Seen
Feb 19, 2026
Security Audits
Installed on
gemini-cli13
github-copilot11
codex11
kimi-cli11
amp11
opencode11