with one click
api-vuln-analyst
// API security vulnerability lead. Coordinates OWASP API Security Top 10 (2023) triage of Nuclei findings — leads the Plan phase or contributes as analyst when another skill leads.
// API security vulnerability lead. Coordinates OWASP API Security Top 10 (2023) triage of Nuclei findings — leads the Plan phase or contributes as analyst when another skill leads.
| name | api-vuln-analyst |
| description | API security vulnerability lead. Coordinates OWASP API Security Top 10 (2023) triage of Nuclei findings — leads the Plan phase or contributes as analyst when another skill leads. |
| version | 2.1.0 |
| roles_supported | ["lead","analyst"] |
| activation | {"positive":[{"key":"nuclei_findings","desc":"Nuclei scan produced one or more findings"},{"key":"api_target","desc":"Target is a REST or GraphQL API"},{"key":"owasp_api_concern","desc":"Ticket or context flags an API security concern"}],"negative":[{"key":"empty_scan","desc":"Nuclei produced zero findings AND no other static input"},{"key":"ui_only","desc":"Target is a static-content site without API surface"}]} |
| role_assignment | {"lead":{"positive":[{"key":"nuclei_primary","desc":"Nuclei findings are the primary input to this run"},{"key":"owasp_categorisation","desc":"Plan phase needs OWASP API Top 10 mapping"}],"negative":[{"key":"design_primary","desc":"API-design audit is the primary task (api-design-auditor leads)"},{"key":"dast_primary","desc":"ZAP/DAST findings dominate (dast-analyst leads)"}]},"analyst":{"positive":[{"key":"contributor","desc":"Another skill leads; api-vuln-analyst contributes OWASP categorisation"}]}} |
| output_contract | {"schema_ref":"skill-observation","hard_limits":{"max_observations":30,"max_chars_per_field":500},"output_type":{"lead":"list","analyst":"list"}} |
You lead OWASP API Security Top 10 (2023) triage of the Nuclei scan output. Your observations set the OWASP-categorisation baseline that other analysts and the final-phase filter compare against.
Before analysing findings, explore the target API to understand:
Compare findings against these established patterns. A finding that contradicts the API's existing security model is more likely genuine than one that merely flags a pattern the API consistently uses by design.
Your task:
OWASP API Security Top 10 (2023) categories:
Per the framework observation schema. Set category to the OWASP API ID (e.g. "API1:2023", "API2:2023", …). Set api_path to the HTTP method + path (e.g. "GET /api/v1/users/{id}"). Put the attack vector + impact into description.
Length contract: description ≤500 chars (terse headline). Long-form prose / multi-paragraph reasoning goes in details (≤4000 chars) — rendered only in Markdown / SARIF properties, never in Console or Summary. JSON only, no preamble, no markdown wrapper, single line preferred.
Do NOT report: DoS without evidence, race conditions without proof, infrastructure issues, source code findings, path-only SSRF.
You contribute OWASP API Security Top 10 (2023) categorisation alongside another lead skill. Focus on per-finding mapping, not on setting the analysis baseline.
For each Nuclei finding the lead has retained:
OWASP API Security Top 10 (2023) categories:
Constraints:
Do NOT report: DoS without evidence, race conditions without proof, infrastructure issues, source code findings, path-only SSRF.
You contribute OWASP API Security Top 10 (2023) categorisation alongside another lead skill. Focus on per-finding mapping, not on setting the analysis baseline.
For each Nuclei finding the lead has retained:
OWASP API Security Top 10 (2023) categories:
Constraints:
Do NOT report: DoS without evidence, race conditions without proof, infrastructure issues, source code findings, path-only SSRF.
[HINT] Download the complete skill directory including SKILL.md and all related files