This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.
7.5
Rating
0
Installs
Security
Category
This is a comprehensive red team methodology skill with excellent practical coverage of reconnaissance and vulnerability discovery workflows. The description clearly indicates when to invoke it (red team methodology, bug bounty, subdomain enumeration, XSS hunting). Task knowledge is strong with detailed command sequences, tool chains, and proven methodologies from security researchers. Structure is good with clear sections and a quick reference table, though the single-file format is dense for such extensive content. Novelty is moderate - while the skill aggregates valuable security workflows that would consume many tokens if reconstructed each time, most individual commands are standard tool invocations that a CLI agent could execute. The value lies primarily in the curated methodology, tool combinations, and Jason Haddix analysis framework rather than truly novel automation. Minor improvements could include splitting into separate workflow files for better modularity and adding more complex automated scripts that integrate multiple tools.
Loading SKILL.md…