Implement proven methodologies and tool workflows from top security researchers for effective reconnaissance, vulnerability discovery, and bug bounty hunting. Automate common tasks while maintaining thorough coverage of attack surfaces.
This skill is applicable to execute the workflow or actions described in the overview.
AI-powered evaluation of trust, security posture, quality signals, and fit for your use case. Grounded in the skill's actual data.
Detected signals: hidden HTML comments, missing license.
• Contains HTML comments in the skill definition. This is sometimes used to embed hidden instructions. Review the raw SKILL.md if you want to audit the full content.
• No license declared. Usage rights are ambiguous — contact the skill author before using commercially.
Compare this skill side-by-side with an alternative to find the best fit.
Compare with another skill →