Initial commit

This commit is contained in:
Zhongwei Li
2025-11-30 08:22:48 +08:00
commit 0393d8cabf
8 changed files with 165 additions and 0 deletions

View File

@@ -0,0 +1,15 @@
{
"name": "xss-vulnerability-scanner",
"description": "Scan for XSS vulnerabilities",
"version": "1.0.0",
"author": {
"name": "Jeremy Longshore",
"email": "[email protected]"
},
"skills": [
"./skills"
],
"commands": [
"./commands"
]
}

3
README.md Normal file
View File

@@ -0,0 +1,3 @@
# xss-vulnerability-scanner
Scan for XSS vulnerabilities

8
commands/scan-xss.md Normal file
View File

@@ -0,0 +1,8 @@
---
description: DESCRIPTION_PLACEHOLDER
shortcut: SHORTCUT_PLACEHOLDER
---
# TITLE_PLACEHOLDER
CONTENT_PLACEHOLDER

61
plugin.lock.json Normal file
View File

@@ -0,0 +1,61 @@
{
"$schema": "internal://schemas/plugin.lock.v1.json",
"pluginId": "gh:jeremylongshore/claude-code-plugins-plus:plugins/security/xss-vulnerability-scanner",
"normalized": {
"repo": null,
"ref": "refs/tags/v20251128.0",
"commit": "ed2af40cc63e75b285a43e05e06cd0b0ea947deb",
"treeHash": "1231cdf3cfdcd9a76a37d6e2fd84cfbf5ad8263f7eb18a2c517790670488a0f9",
"generatedAt": "2025-11-28T10:18:53.234048Z",
"toolVersion": "publish_plugins.py@0.2.0"
},
"origin": {
"remote": "git@github.com:zhongweili/42plugin-data.git",
"branch": "master",
"commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390",
"repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data"
},
"manifest": {
"name": "xss-vulnerability-scanner",
"description": "Scan for XSS vulnerabilities",
"version": "1.0.0"
},
"content": {
"files": [
{
"path": "README.md",
"sha256": "31cd8ad0ec53c3b07f8a50da10c6057d5a7195d91e6eb36231693c8a5ba9a334"
},
{
"path": ".claude-plugin/plugin.json",
"sha256": "15b6a8f1a15f024dbd45bc97d38c6818136f647202f2905ae31b90367ab164df"
},
{
"path": "commands/scan-xss.md",
"sha256": "26981dafecd0bda9d89082c091325c9fdc3ac197318243e952dde0b1a38f4088"
},
{
"path": "skills/xss-vulnerability-scanner/SKILL.md",
"sha256": "6e6e01df7e1b8a5946cb3729028fe5f95f72270f11ace64826150d2121f7f425"
},
{
"path": "skills/xss-vulnerability-scanner/references/README.md",
"sha256": "b84beebf254d1b6f21769e6acd359543a0e7fef3760dab4272b52788e1b4172b"
},
{
"path": "skills/xss-vulnerability-scanner/scripts/README.md",
"sha256": "6cfe31f15691fe9a872e0ca73f8e7bb6f5241e49d4ce6639ba1078a789158b4b"
},
{
"path": "skills/xss-vulnerability-scanner/assets/README.md",
"sha256": "3e812069664de536dc3afec8edaec64ff060612974434089ec8f8769bfbe12e4"
}
],
"dirSha256": "1231cdf3cfdcd9a76a37d6e2fd84cfbf5ad8263f7eb18a2c517790670488a0f9"
},
"security": {
"scannedAt": null,
"scannerVersion": null,
"flags": []
}
}

View File

@@ -0,0 +1,57 @@
---
name: scanning-for-xss-vulnerabilities
description: |
This skill enables Claude to automatically scan for XSS (Cross-Site Scripting) vulnerabilities in code. It is triggered when the user requests to "scan for XSS vulnerabilities", "check for XSS", or uses the command "/xss". The skill identifies reflected, stored, and DOM-based XSS vulnerabilities. It analyzes HTML, JavaScript, CSS, and URL contexts to detect potential exploits and suggests safe proof-of-concept payloads. This skill is best used during code review, security audits, and before deploying web applications to production.
allowed-tools: Read, WebFetch, WebSearch, Grep
version: 1.0.0
---
## Overview
This skill empowers Claude to proactively identify and report XSS vulnerabilities within your codebase. By leveraging advanced detection techniques, including context-aware analysis and WAF bypass testing, this skill ensures your web applications are resilient against common XSS attack vectors. It provides detailed insights into vulnerability types and offers guidance on remediation strategies.
## How It Works
1. **Activation**: Claude recognizes the user's intent to scan for XSS vulnerabilities through specific trigger phrases like "scan for XSS" or the shortcut "/xss".
2. **Code Analysis**: The plugin analyzes the codebase, identifying potential XSS vulnerabilities across different contexts (HTML, JavaScript, CSS, URL).
3. **Vulnerability Detection**: The plugin detects reflected, stored, and DOM-based XSS vulnerabilities by injecting various payloads and analyzing the responses.
4. **Reporting**: The plugin generates a report highlighting identified vulnerabilities, their location in the code, and recommended remediation steps.
## When to Use This Skill
This skill activates when you need to:
- Perform a security audit of your web application.
- Review code for potential XSS vulnerabilities.
- Ensure compliance with security standards.
- Test the effectiveness of your Content Security Policy (CSP).
- Identify and mitigate XSS vulnerabilities before deploying to production.
## Examples
### Example 1: Detecting Reflected XSS
User request: "scan for XSS vulnerabilities in the search functionality"
The skill will:
1. Analyze the code related to the search functionality.
2. Identify a reflected XSS vulnerability in how search queries are displayed.
3. Report the vulnerability, including the affected code snippet and a suggested fix using proper sanitization.
### Example 2: Identifying Stored XSS
User request: "/xss check the comment submission form"
The skill will:
1. Analyze the comment submission form and its associated backend code.
2. Detect a stored XSS vulnerability where user comments are saved to the database without sanitization.
3. Report the vulnerability, highlighting the unsanitized comment storage and suggesting the use of a sanitization library like `sanitizeHtml`.
## Best Practices
- **Sanitization**: Always sanitize user input before displaying it on the page. Use appropriate escaping functions for the specific context (HTML, JavaScript, URL).
- **Content Security Policy (CSP)**: Implement a strong CSP to restrict the sources from which the browser can load resources, mitigating the impact of XSS vulnerabilities.
- **Regular Updates**: Keep your web application framework and libraries up to date to patch known XSS vulnerabilities.
## Integration
This skill complements other security-focused plugins by providing targeted XSS vulnerability detection. It can be integrated with code review tools to automate security checks and provide developers with immediate feedback on potential XSS issues.

View File

@@ -0,0 +1,7 @@
# Assets
Bundled resources for xss-vulnerability-scanner skill
- [ ] payload_templates/: Directory containing various XSS payload templates for different contexts (HTML, JavaScript, CSS, URL).
- [ ] report_template.html: HTML template for generating XSS vulnerability reports.
- [ ] waf_signatures.json: JSON file containing signatures of common Web Application Firewalls (WAFs) for bypass testing.

View File

@@ -0,0 +1,7 @@
# References
Bundled resources for xss-vulnerability-scanner skill
- [ ] xss_cheat_sheet.md: Comprehensive XSS cheat sheet with various attack vectors and bypass techniques.
- [ ] csp_reference.md: Detailed documentation on Content Security Policy (CSP) and its effectiveness against XSS.
- [ ] dom_xss_analysis.md: Guide on analyzing and mitigating DOM-based XSS vulnerabilities.

View File

@@ -0,0 +1,7 @@
# Scripts
Bundled resources for xss-vulnerability-scanner skill
- [ ] xss_scan.py: Automates XSS scanning with customizable payloads and context analysis.
- [ ] waf_bypass.py: Tests common WAF bypass techniques against identified vulnerabilities.
- [ ] report_generator.py: Generates detailed XSS vulnerability reports in various formats (e.g., HTML, Markdown).