Install
openclaw skills install web-vulnerability-assessmentGenerate comprehensive web application vulnerability assessments with OWASP-aligned checklists, remediation guides, and testing scripts. Use when assessing w...
openclaw skills install web-vulnerability-assessmentGenerate comprehensive web application vulnerability assessments aligned to OWASP Top 10 and major compliance frameworks. Covers 19 vulnerability categories across 100+ individual checks. Returns a full assessment report, security checklist, remediation guide, and optional testing scripts tailored to your technology stack.
Built by a CISSP/CISM certified security professional at ToolWeb.in
TOOLWEB_API_KEY — Get your API key from portal.toolweb.incurl must be available on the systemPOST https://portal.toolweb.in/apis/security/web-vuln-assessment
| Key | Category | Severity | OWASP |
|---|---|---|---|
| injection | Injection Vulnerabilities | CRITICAL | A03:2021 |
| authentication | Broken Authentication & Session Management | HIGH | A07:2021 |
| data_exposure | Sensitive Data Exposure | HIGH | A02:2021 |
| misconfiguration | Security Misconfiguration | MEDIUM | A05:2021 |
| xml_vulnerabilities | XML Vulnerabilities | HIGH | — |
| access_control | Broken Access Control | HIGH | A01:2021 |
| deserialization | Insecure Deserialization | HIGH | A08:2021 |
| api_security | API Security | HIGH | — |
| communication | Insecure Communication | MEDIUM | — |
| client_side | Client-Side Vulnerabilities | MEDIUM | — |
| dos | Denial of Service | MEDIUM | — |
| ssrf | Server-Side Request Forgery | HIGH | A10:2021 |
| auth_bypass | Authentication Bypass | CRITICAL | — |
| content_spoofing | Content Spoofing | MEDIUM | — |
| business_logic | Business Logic Flaws | HIGH | — |
| zero_day | Zero-Day Patterns | CRITICAL | — |
| mobile | Mobile App Vulnerabilities | HIGH | — |
| iot | IoT Vulnerabilities | HIGH | — |
| other | Other Vulnerabilities | MEDIUM | — |
php, nodejs, python, java, dotnet, ruby, react, angular, vue, wordpress, mysql, postgresql, mongodb, redis, docker, kubernetes, aws, azure, nginx, apache
owasp_top_10, pci_dss, gdpr, hipaa
Gather inputs from the user:
Required:
organization_name — Organization nameapplication_name — Name of the application being assessedapplication_type — Type of app (e.g., "Web Application", "REST API", "Single Page App", "E-commerce Platform", "CMS", "Mobile Backend")technology_stack — Technologies used (e.g., ["python", "react", "postgresql", "docker", "aws"])deployment_environment — Where it's deployed (e.g., "Cloud (AWS)", "Cloud (Azure)", "On-Premise", "Hybrid", "Containerized")assessment_scope — Which vulnerability categories to assess (e.g., ["injection", "authentication", "data_exposure", "api_security"] or use all categories for a full assessment)Optional:
compliance_frameworks — Compliance mapping (e.g., ["owasp_top_10", "pci_dss"]) (default: [])include_remediation — Include remediation guides (default: true)include_testing_scripts — Include testing procedures (default: false)assessor_name — Name of the assessor (optional)Call the API:
curl -s -X POST "https://portal.toolweb.in/apis/security/web-vuln-assessment" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"organization_name": "<org>",
"application_name": "<app>",
"application_type": "<type>",
"technology_stack": ["<tech1>", "<tech2>"],
"deployment_environment": "<env>",
"compliance_frameworks": ["owasp_top_10"],
"assessment_scope": ["injection", "authentication", "data_exposure", "access_control", "api_security"],
"include_remediation": true,
"include_testing_scripts": false
}'
Parse the response. The API returns:
assessment_html — Full vulnerability assessment reportchecklist_html — Security testing checklistremediation_html — Remediation guide with fix recommendationstesting_scripts_html — Testing procedures (if requested)generated_at — TimestampThe response is in HTML format. Extract the key findings, risk ratings, and recommendations to present to the user in a readable format.
Present results with prioritized findings by severity.
🕷️ Web Vulnerability Assessment
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Application: [app_name]
Tech Stack: [technologies]
Scope: [categories assessed]
Compliance: [frameworks]
🔴 CRITICAL Findings:
[List critical vulnerabilities found]
🟠 HIGH Findings:
[List high-severity vulnerabilities]
🟡 MEDIUM Findings:
[List medium-severity vulnerabilities]
📋 Security Checklist:
[Key checks and their status]
🔧 Top Remediation Actions:
1. [Fix] — Severity: Critical
2. [Fix] — Severity: High
3. [Fix] — Severity: High
📎 Full report powered by ToolWeb.in
TOOLWEB_API_KEY is not set: Tell the user to get an API key from https://portal.toolweb.inUser: "Assess the security of our Python/React e-commerce app on AWS"
Agent flow:
curl -s -X POST "https://portal.toolweb.in/apis/security/web-vuln-assessment" \
-H "Content-Type: application/json" \
-H "X-API-Key: $TOOLWEB_API_KEY" \
-d '{
"organization_name": "ShopFast Inc",
"application_name": "ShopFast E-commerce",
"application_type": "E-commerce Platform",
"technology_stack": ["python", "react", "postgresql", "redis", "docker", "aws"],
"deployment_environment": "Cloud (AWS)",
"compliance_frameworks": ["owasp_top_10", "pci_dss"],
"assessment_scope": ["injection", "authentication", "data_exposure", "misconfiguration", "access_control", "api_security", "communication", "client_side", "ssrf", "business_logic"],
"include_remediation": true,
"include_testing_scripts": false
}'
Created by ToolWeb.in — a security-focused MicroSaaS platform with 200+ security APIs, built by a CISSP & CISM certified professional. Trusted by security teams in USA, UK, and Europe and we have platforms for "Pay-per-run", "API Gateway", "MCP Server", "OpenClaw", "RapidAPI" for execution and YouTube channel for demos.
include_testing_scripts for penetration testing teams