{"skill":{"slug":"ctf-web","displayName":"Ctf Web","summary":"Provides web exploitation techniques for CTF challenges. Use when solving web security challenges involving XSS, SQLi, SSTI, SSRF, CSRF, XXE, file upload byp...","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":277,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1774866263458,"updatedAt":1774866408892},"latestVersion":{"version":"1.0.0","createdAt":1774866263458,"changelog":"Initial release of ctf-web skill.  \n- Provides web exploitation techniques for CTF challenges: XSS, SQLi, SSTI, SSRF, CSRF, XXE, file upload bypasses, JWT attacks, prototype pollution, path traversal, command injection, auth bypass, SAML/OAuth exploitation, subdomain takeover, more.\n- Includes quick reference plus detailed supporting files for a wide range of web attack techniques.\n- Lists prerequisite tools and resources for common CTF platforms (Python, Linux, macOS, Go).\n- Organizes content by attack type: server/client-side, authentication, Node.js, Web3, CVEs, and advanced techniques.\n- For use with filesystem-enabled agents (e.g. Claude Code) with Bash and Python 3.","license":"MIT-0"},"metadata":null,"owner":{"handle":"gandli","userId":"s17c214vqwcqpk2wczqpbmyngd83xsas","displayName":"gandli","image":"https://avatars.githubusercontent.com/u/85359251?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.llm_suspicious","suspicious.prompt_injection_instructions","suspicious.vt_suspicious"],"summary":"Detected: suspicious.llm_suspicious, suspicious.prompt_injection_instructions, suspicious.vt_suspicious","engineVersion":"v2.2.0","updatedAt":1774866408892}}