3.3 KiB
name, description
| name | description |
|---|---|
| quick | Time-boxed rapid assessment targeting high-impact vulnerabilities |
Quick Testing Mode
Time-boxed assessment focused on high-impact vulnerabilities. Prioritize breadth over depth.
Approach
Optimize for fast feedback on critical security issues. Skip exhaustive enumeration in favor of targeted testing on high-value attack surfaces.
Phase 1: Rapid Orientation
Whitebox (source available)
- Focus on recent changes: git diffs, new commits, modified files—these are most likely to contain fresh bugs
- Read existing
wikinotes first (list_notes(category="wiki")thenget_note(note_id=...)) to avoid remapping from scratch - Run a fast static triage on changed files first (
semgrep, then targetedsgqueries) - Run at least one lightweight AST pass (
sgor Tree-sitter) so structural mapping is not skipped - Keep AST commands tightly scoped to changed or high-risk paths; avoid broad repository-wide pattern dumps
- Run quick secret and dependency checks (
gitleaks,trufflehog,trivy fs) scoped to changed areas when possible - Identify security-sensitive patterns in changed code: auth checks, input handling, database queries, file operations
- Trace user input through modified code paths
- Check if security controls were modified or bypassed
- Before completion, update the shared repo wiki with what changed and what needs dynamic follow-up
Blackbox (no source)
- Map authentication and critical user flows
- Identify exposed endpoints and entry points
- Skip deep content discovery—test what's immediately accessible
Phase 2: High-Impact Targets
Test in priority order:
- Authentication bypass - login flaws, session issues, token weaknesses
- Broken access control - IDOR, privilege escalation, missing authorization
- Remote code execution - command injection, deserialization, SSTI
- SQL injection - authentication endpoints, search, filters
- SSRF - URL parameters, webhooks, integrations
- Exposed secrets - hardcoded credentials, API keys, config files
Skip for quick scans:
- Exhaustive subdomain enumeration
- Full directory bruteforcing
- Low-severity information disclosure
- Theoretical issues without working PoC
Phase 3: Validation
- Confirm exploitability with minimal proof-of-concept
- Demonstrate real impact, not theoretical risk
- Report findings immediately as discovered
Chaining
When a strong primitive is found (auth weakness, injection point, internal access), immediately attempt one high-impact pivot to demonstrate maximum severity. Don't stop at a low-context "maybe"—turn it into a concrete exploit sequence that reaches privileged action or sensitive data.
Operational Guidelines
- Use browser tool for quick manual testing of critical flows
- Use terminal for targeted scans with fast presets (e.g., nuclei with critical/high templates only)
- Use proxy to inspect traffic on key endpoints
- Skip extensive fuzzing—use targeted payloads only
- Create subagents only for parallel high-priority tasks
Mindset
Think like a time-boxed bug bounty hunter going for quick wins. Prioritize breadth over depth on critical areas. If something looks exploitable, validate quickly and move on. Don't get stuck—if an attack vector isn't yielding results quickly, pivot.