Xss Scanner

v1.4.0

Scans web apps for reflected and DOM-based XSS using 24+ payloads across 6 contexts, with crawl and concurrency support for authorized security audits.

0· 131·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for snipercat69/edgeiq-xss-scanner.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Xss Scanner" (snipercat69/edgeiq-xss-scanner) from ClawHub.
Skill page: https://clawhub.ai/snipercat69/edgeiq-xss-scanner
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install edgeiq-xss-scanner

ClawHub CLI

Package manager switcher

npx clawhub@latest install edgeiq-xss-scanner
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md and included Python modules (scanner, proxy rotation, licensing, Discord wrapper) are consistent with an XSS scanning tool. The proxy rotator, licensing checks, and Discord command wrapper are plausible components for this purpose.
Instruction Scope
SKILL.md instructs running scanner.py against arbitrary targets (including blind-callback and proxy options) and the discord wrapper runs scanner.py via subprocess. This is expected, but the shipped payload library contains explicit exfiltration payloads (e.g. fetch calls to hardcoded domains like 'evil.com') and the blind-callback option sends data to external callback URLs — both are normal for XSS testing but can leak data if used irresponsibly. The proxy loader fetches third-party proxy lists from raw GitHub URLs.
Install Mechanism
Instruction-only / no install spec. All code is present in the package and no external installers or arbitrary downloads are performed during install. Risk from install mechanism is low.
Credentials
The skill requests no environment variables or credentials. Licensing checks read local license files and respect an EDGEIQ_LICENSE_TIER env var — this is proportionate to the declared pricing/licensing behavior.
Persistence & Privilege
The skill is not always-enabled, does not request elevated or persistent platform privileges, and does not write to other skills' configs. It reads local license files and may print upgrade prompts, which is typical and proportionate.
Assessment
This package appears coherent for authorized security testing, but it contains intentionally malicious-looking XSS payloads (including ones that fetch/exfiltrate document.cookie to external domains) and a blind-callback feature and proxy loader that perform network requests. Only install/use this on targets you own or have explicit written permission to test. Before using in shared/chat environments: (1) review/replace any hardcoded callback domains (e.g., 'evil.com') with your own collector or remove exfiltration-style payloads; (2) be aware the Discord wrapper runs the scanner as a subprocess and may run long scans; (3) the proxy rotator fetches public proxy lists from third-party raw URLs — verify these sources if you require provenance; (4) inspect licensing/upgrade URLs if you do not want external payment links printed. If you need higher assurance, run the scanner in an isolated environment and audit network traffic during its first runs.

Like a lobster shell, security has layers — review code before you run it.

latestvk978519skae1e7sr3tfzpvqcyx85gz9p
131downloads
0stars
5versions
Updated 3d ago
v1.4.0
MIT-0

EdgeIQ XSS Scanner

Version: 1.2.0
Skill Name: xss-scanner
Category: Security / Offensive / Auditing
Author: EdgeIQ Labs
License: Defensive Use Only
OpenClaw Compatible: Yes — Python 3, pure stdlib, WSL + Windows + macOS


What It Does

Professional-grade XSS vulnerability scanner for authorized security auditing. Scans web applications for reflected XSS, DOM-based XSS, stored/persistent XSS (via blind callback), and WAF-bypass variants. Designed for penetration testers, bug bounty researchers, and security teams with explicit written authorization.

⚠️ Legal Notice: Only scan targets you own or have explicit written permission to audit. Unauthorized scanning is illegal and strictly prohibited. This tool is for defensive security professionals.


Pricing

FeatureLifetime ($39)Optional Monthly ($7/mo)
All scanner features
Blind XSS detection
Screenshot evidence capture
HTML report export
Reflected params deep analysis
Scheduled recurring scans
Alert delivery (Discord/Telegram/Email)
Priority support
Core reflected XSS scan (40+ payloads)
Crawl mode + BFS depth
JSON report export
HTTP security header analysis
WAF detection + auto-bypass
Custom headers, cookies, auth
Proxy support
Rate limiting control
--quiet mode + exit codes

Lifetime License: $39 — your tool forever, all Pro features included permanently.

Optional Monthly: $7/mo — for those who prefer recurring billing (cancel anytime).

👉 Buy Lifetime — $39 👉 Subscribe Monthly — $7/mo 👉 Subscribe Monthly — $7/mo


Feature Tiers at a Glance

FeatureFreeLifetime ($39)
Core reflected XSS scan (40+ payloads)
Crawl mode + BFS depth
JSON report export
HTTP security header analysis
WAF detection + auto-bypass
Custom headers, cookies, auth
Proxy support
Rate limiting control
--quiet mode + exit codes
Blind XSS detection (--blind-callback)
Screenshot evidence capture (--screenshot-dir)
HTML report export (--format html)
Reflected params deep analysis
Scheduled recurring scans
Alert delivery (Discord/Telegram/Email)
Priority support

All Pro features are now included in the Lifetime License. The Lifetime purchase gives you permanent access to everything previously locked behind Pro/Bundle tiers.


What's New in v2

FeatureFreeLifetime ($39)
Core reflected XSS scan
40+ payloads (incl. WAF bypass)
7 injection context modes
Crawl mode with BFS depth
JSON + HTML report export
HTTP security header analysis (CSP, XFO, HSTS…)
WAF detection + auto-bypass payload switching
Custom headers, cookies, auth
Proxy support (stealth scanning)
Rate limiting control
Blind XSS detection (callback mode)
Reflected params analysis
Screenshot evidence capture
--quiet mode + exit codes (CI/CD)
Scheduled recurring scans
Alert delivery (Discord / Telegram / Email)
Priority support

Installation

# Standalone usage
python3 /home/guy/.openclaw/workspace/apps/xss-scanner/scanner.py <target>

# As OpenClaw command (in any channel):
!xss https://example.com
!xss https://example.com --depth 3 --workers 20

Quick Start

Basic Scan

python3 scanner.py https://example.com

Verbose / Full Crawl

python3 scanner.py https://example.com --depth 2 --max-urls 30

With Proxy (Burp Suite / OWASP ZAP)

python3 scanner.py https://example.com --proxy http://127.0.0.1:8080 --quiet

Authenticated Scan

python3 scanner.py https://example.com --auth admin:secret --cookies "session=abc123"

Blind XSS (stored/persistent XSS detection)

python3 scanner.py https://example.com --blind-callback https://your-callback.com/log

Security Headers Audit

python3 scanner.py https://example.com --analyze-headers --format json --out report.json

Export HTML Report

python3 scanner.py https://example.com --format html --out xss-report.html

Automation / CI-CD (exit codes + quiet mode)

python3 scanner.py https://example.com --quiet --format json -o result.json
echo "Exit code: $?"   # 0=safe, 1=vulns found, 2=error, 3=interrupted

Command Reference

Positional Arguments

ArgumentDescription
urlTarget URL (auto-adds https:// if missing)

Core Options

FlagTypeDefaultDescription
--depthint2Crawl depth (BFS link discovery)
--max-urlsint20Maximum URLs to scan before stopping
--workersint15Concurrent threads for payload testing
--formatchoicediscordOutput format: discord, json, html, simple
--follow-externalflagFalseFollow links to external domains
--quiet, -qflagFalseSuppress progress output
--out, -opathWrite output to file

Network Options

FlagTypeDescription
--proxyURLHTTP/S proxy (e.g. http://127.0.0.1:8080 for Burp/ZAP)
--user-agentstringCustom User-Agent string
--authuser:passBasic HTTP authentication
--cookiesstringCookie string (name=value; name2=value2)
--custom-headerHDRAdd custom header (Name: value) — repeatable
--timeoutfloatRequest timeout in seconds (default: 15)
--rate-limitfloatMinimum seconds between requests (anti-rate-limit)

Advanced Options

FlagTypeDescription
--blind-callbackURLBlind XSS callback URL for stored XSS detection
--analyze-headersflagAnalyze HTTP security headers (CSP, X-Frame-Options, HSTS…)
--reflected-onlyflagMap reflected params without sending payloads
--screenshot-dirpathDirectory for evidence HTML files (default: /tmp/xss-screenshots)

Exit Codes

CodeMeaning
0Scan complete — no vulnerabilities found
1Scan complete — vulnerabilities detected
2Scan error — target unreachable or connection failed
3Interrupted — SIGINT/SIGTERM received

Payload Context Detection

The scanner automatically detects the injection context of each reflection and assigns severity accordingly:

ContextTriggered WhenSeverityExample
js_stringPayload inside <script> or JS stringCritical<script>alert(1)</script>
event_handlerPayload inside on* attributeCriticalonerror=alert(1)
html_attrPayload inside HTML attributeHigh" onmouseover=alert(1) x="
domDOM mutation / innerHTML injectionHighDOM clobbering vectors
html_bodyPlain text reflection in HTMLMedium<script>alert(1)</script>
commentInside HTML comment <!-- -->Medium--><script>alert(1)</script>
cssInside <style> tagMediumStyle-based injection
url_paramURL-encoded param in URLLow?q=<script>alert(1)</script>

WAF Detection & Bypass

Automatically detects these WAFs and switches to bypass payloads:

  • Cloudflare, AWS CloudFront, Akamai, Imperva
  • Fortinet, Sucuri, F5 BIG-IP ASM, Barracuda
  • DenyAll, Cisco ACE, dotDefender, Google Armr

Bypass payloads activated automatically when WAF block patterns are detected:

  • Case mutation: <ScRipT>, <IMG SRC=x ONERROR=...>
  • Unicode escape: <script>\u0061lert(1)</script>
  • Protocol-less: //evil.com/x.js

Security Header Analysis

When --analyze-headers is used, reports on:

HeaderWhat It Checks
Content-Security-Policyunsafe-inline / unsafe-eval present?
X-Frame-OptionsClickjacking protection (DENY / SAMEORIGIN)
X-Content-Type-OptionsMIME-sniffing disabled (nosniff)
Strict-Transport-SecurityHTTPS enforcement
Referrer-PolicyReferrer leakage
X-XSS-ProtectionLegacy XSS filter (often disabled intentionally)
Permissions-PolicyBrowser feature restrictions

Output Formats

Discord (default)

Rich embed with severity breakdown, grouped by critical/high/medium/low. Clean formatting for Discord channels.

JSON (machine-readable)

Full structured report for CI/CD pipelines, includes:

  • Scan stats + metadata
  • All vulnerabilities with severity, evidence, timestamp
  • Security header findings
  • WAF detection results
  • Reflected parameter map

HTML (shareable report)

Self-contained styled HTML file — dark theme, sortable vulnerability table, header findings, WAF info. Ready to share with clients or include in pentest deliverables.

Simple (console)

One-line-per-finding format. Good for grep/parsing.


Discord Command Usage

In any OpenClaw Discord channel:

!xss https://example.com
!xss https://example.com --depth 3 --max-urls 50 --workers 20
!xss https://example.com --follow-external --format json -o report.json
!xss https://example.com --proxy http://127.0.0.1:8080 --quiet
!xss https://example.com --blind-callback https://your-domain.com/log
!xss https://example.com --analyze-headers --format html -o report.html

Free vs Pro

Free (v1) — Included

Full-featured scanner for manual authorized auditing. Everything in this SKILL.md except the Pro-only items.

Pro ($19/mo)

  • Blind XSS detection with persistent callback monitoring
  • Scheduled recurring scans (cron-based)
  • Alert delivery to Discord, Telegram, or Email
  • Screenshot evidence capture
  • Reflected params deep analysis
  • Priority onboarding and support

Network Pro ($29/mo) (deprecated)

All features included in Lifetime purchase above.

Bundle ($39/mo) (deprecated)

All features now included in Lifetime purchase above.

Upgrade Links

TierLink
$39$39
Monthly ($7/mo)$7/mo
$7/mo$7/mo

Contact: gpalmieri21@gmail.com


Architecture

ComponentDetail
LanguagePython 3 (pure stdlib — no external dependencies)
Concurrencyconcurrent.futures.ThreadPoolExecutor for parallel payload testing
Crawl StrategyBFS with configurable depth, URL dedup, external-link filtering
HTTP ClientCustom HTTPClient class with proxy, auth, cookie, custom-header support
WAF DetectionPattern-matching on response body + headers against 15+ WAF signatures
Context DetectionRegex + HTML parser across 8 injection contexts
Payload Library40+ payloads across script injection, event handlers, attribute injection, URL injection, context breakers, mution/mull-byte bypass, Unicode, DOM clobbering
Supported OSLinux/WSL, Windows, macOS
Exit CodesFull automation support (0/1/2/3)

Legal & Ethical Use

This tool is for:

  • Security researchers auditing authorized bug bounty targets
  • Penetration testers assessing client applications under contract
  • Developers testing their own applications
  • Defensive security teams auditing internal infrastructure
  • Capture The Flag (CTF) participants in authorized labs

This tool must NOT be used:

  • Against targets without explicit written permission
  • On production systems without authorization
  • For any unauthorized access, enumeration, or exploitation
  • In any jurisdiction where automated vulnerability scanning is restricted

Support


🔗 More from EdgeIQ Labs

edgeiqlabs.com — Security tools, OSINT utilities, and micro-SaaS products for developers and security professionals.

  • 🛠️ Subdomain Hunter — Passive subdomain enumeration via Certificate Transparency
  • 📸 Screenshot API — URL-to-screenshot API for developers
  • 🔔 uptime.check — URL uptime monitoring with alerts
  • 🛡️ headers.check — HTTP security headers analyzer

👉 Visit edgeiqlabs.com →

Comments

Loading comments...