pentest-exploit-execution-payload-control
SKILL.md
Exploit Execution & Payload Control
Activation Triggers (Positive)
build exploitweaponizepayloadchain findingsprove impactpost exploitation
Exclusion Triggers (Negative)
reconenumerationhypothesis onlyformat report
Output Schema
- Exploit plan:
preconditions,primitive,payload strategy,safety guardrails - Execution log:
step,result,evidence - Final capability statement: what attacker can do after exploitation
Instructions
- Require at least one validated security primitive before exploit implementation.
- Choose deterministic payloads with clear rollback or containment strategy.
- Execute in smallest viable sequence to prove impact with minimal disruption.
- Record exact preconditions and environmental dependencies.
- Separate exploit reliability issues from vulnerability existence.
- Produce reproducible commands and evidence suitable for independent verification.
Should Do
- Prefer deterministic, low-noise payloads over broad spray strategies.
- Preserve proof artifacts that map directly to attacker capability.
- Stop when impact is proven; avoid unnecessary escalation.
Should Not Do
- Do not claim successful exploitation from partial side effects.
- Do not run destructive payloads unless explicitly authorized.
- Do not rely on environment-specific hardcoded tooling paths in reusable instructions.
Weekly Installs
15
Repository
crtvrffnrt/skillsFirst Seen
Feb 19, 2026
Security Audits
Installed on
gemini-cli15
opencode13
github-copilot13
amp13
codex13
kimi-cli13