Install
openclaw skills install web-front-scannerPerform a thorough client-side / browser-facing security assessment of a target web application. Use this skill whenever the user asks to pentest, audit, or review the security of a website or web app from the browser/frontend perspective, mentions client-side vulnerabilities (XSS, CORS, open redirect, clickjacking, prototype pollution, JWT leakage, source maps, etc.), wants to find sensitive data exposed in JavaScript bundles or client code, or asks for a security report on front-end attack surface. Trigger even if the user just says "test the security of this site", "find vulnerabilities in this web app", or "run a pentest on the frontend".
openclaw skills install web-front-scannerA skill for conducting thorough, non-destructive client-side security reviews of web applications, producing a structured Markdown report covering all major browser-facing attack surface categories.
Before executing, confirm these values with the user if not already provided:
| Variable | Description |
|---|---|
TARGET | Primary target URL |
LOGIN | Login URL or credentials (if authenticated testing is in scope) |
CRED_AREAS | Credential areas needing extra attention |
TOOLS_DIR | Path to any custom tools folder |
SCOPE | Client-side and front-end only (unless user explicitly extends) |
Identify the following across the client-side attack surface:
Cover all of the following (mark each as Confirmed / Likely / Informational / False Positive):
Injection & Scripting
innerHTML, outerHTML, document.writeeval / dynamic code executionRedirects & Framing
window.opener abuseCross-Origin & Trust
postMessage flaws (origin validation)Caching & Service Workers
Data Exposure
localStorage / sessionStorage / cookies.map files reachable)Client-Side Logic & Manipulation
Browser & Misc
.map), manifests, service workers, web workerslocalStorage, sessionStorage, IndexedDB, cookiesrobots.txt, sitemap.xml, .well-known/*, manifest.jsonX-Frame-Options, X-Content-Type-Options,
Referrer-Policy, Permissions-Policy, HSTSTools to use: curl, wget, browser DevTools, gau, waybackurls, hakrawler, katana,
subfinder, httpx, nuclei, custom scripts in TOOLS_DIR, Chrome (manual review)
rel="noopener" presenceTools: retire.js, npm audit, semgrep, grep/ripgrep, browser DevTools Sources tab,
js-beautify, source-map CLI
Origin headerspostMessage handlers: send crafted messages with untrusted originsHttpOnly, Secure, SameSite), scope, expiryFor each identified library:
| Field | Value |
|---|---|
| Library name | |
| Detected version | |
| File path / URL | |
| Evidence | |
| Known CVEs / issues | |
| Assessment | Vulnerable / Outdated / OK |
| Security relevance |
Maintain a running log as you work:
[STEP] Description of action
[TOOL] Tool and command used
[OUTPUT] Key evidence or finding
[CONFIDENCE] High / Medium / Low
Save the final report as:
client_side_pentest_report.md
in the current working directory.
# Client-Side Penetration Test Report
## Executive Summary
## Scope & Assumptions
## Methodology
## Asset Inventory (client-side relevant)
## JavaScript Library Inventory
## Sensitive Data Exposure Findings
## Vulnerability Findings
## Informational Observations
## False Positives Ruled Out
## Recommended Remediation
## Appendix (commands, URLs, raw evidence, notes)
### [FINDING TITLE]
- **Severity**: Critical / High / Medium / Low / Informational
- **CWE**: CWE-XXXX — [name]
- **Affected asset(s)**:
- **Description**:
- **Evidence**:
- **Reproduction steps**:
- **Security impact**:
- **Likelihood / Confidence**: Confirmed / Likely / Informational / False Positive
- **Remediation**:
- **References**: