pentest-auth-bypass

Test authentication and session management controls for bypass and account takeover scenarios.

3,891 stars
Complexity: medium

About this skill

This AI agent skill is designed to perform automated penetration testing focused on authentication and session management. It systematically validates an application's resistance to brute-force attacks, assesses session integrity, and verifies the correct enforcement of multi-factor authentication (MFA). The skill operates within established security frameworks such as PTES, OWASP WSTG, NIST SP 800-115, and MITRE ATT&CK, ensuring a structured and comprehensive approach to vulnerability assessment. The skill's workflow prioritizes ethical and authorized use, requiring explicit consent before live execution and scope validation. It generates detailed findings in a standardized `finding_schema` format, complete with reproducible Proof-of-Concept (PoC) notes, which is crucial for efficient remediation efforts. By automating these critical security checks, the skill helps security professionals and developers proactively identify and mitigate weaknesses that could lead to unauthorized access or data breaches. Ultimately, `pentest-auth-bypass` empowers AI agents to act as virtual security testers, providing actionable intelligence on the robustness of an application's access controls. It's an invaluable tool for enhancing the security posture of web applications and APIs by systematically uncovering critical flaws in user authentication and session handling.

Best use case

The primary use case for `pentest-auth-bypass` is proactive security testing and penetration testing. Security teams, penetration testers, and developers can use it to thoroughly assess the security of authentication mechanisms and session management in web applications or APIs. This helps identify vulnerabilities that could lead to unauthorized access or account takeovers before they can be exploited by malicious actors, significantly improving the overall security posture.

Test authentication and session management controls for bypass and account takeover scenarios.

Users should expect comprehensive `auth-findings.json` detailing identified vulnerabilities with PoC notes, a `valid-sessions.json` file, and an `auth-attack-report.json` summarizing the conducted tests and their outcomes.

Practical example

Example input

Hey agent, please run the `pentest-auth-bypass` skill against the target `https://secureapp.example.com` using the authorization scope defined in `client_scope.json`. Make sure to enable live execution and output all results to the `security_reports` directory in JSON format.

Example output

```json
{
  "finding_id": "AUTH-001",
  "name": "Weak Password Policy - Brute-Force Susceptible",
  "severity": "High",
  "description": "The application does not adequately lock out accounts after multiple failed login attempts, making it vulnerable to brute-force attacks. Passwords like 'password123' were successfully guessed for test accounts.",
  "poc_notes": "Attempted 1000 common passwords against user 'testuser'. Succeeded with 'password123' on attempt #42. No rate limiting or account lockout observed.",
  "references": [
    {"name": "OWASP WSTG-AUTHN-003", "url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Authentication_Testing/03-Testing_for_Brute_Force"}
  ],
  "affected_urls": ["https://secureapp.example.com/login"]
}
```

When to use this skill

  • During penetration testing engagements to evaluate authentication and session management controls.
  • As part of a security audit or compliance check against industry standards like OWASP WSTG.
  • Before deploying new applications or major features that involve user authentication.
  • To continuously validate the effectiveness of multi-factor authentication (MFA) implementations.

When not to use this skill

  • Against systems or targets for which you do not have explicit, written authorization.
  • In a production environment without careful planning, impact assessment, and appropriate dry-run testing.
  • For educational purposes outside of a strictly controlled, isolated, and legally compliant lab environment.
  • If the target system is highly sensitive, critical, or cannot tolerate any level of testing traffic.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/pentest-auth-bypass/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/0x-professor/pentest-auth-bypass/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/pentest-auth-bypass/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How pentest-auth-bypass Compares

Feature / Agentpentest-auth-bypassStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexitymediumN/A

Frequently Asked Questions

What does this skill do?

Test authentication and session management controls for bypass and account takeover scenarios.

How difficult is it to install?

The installation complexity is rated as medium. You can find the installation instructions above.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Pentest Auth Bypass

## Stage

- PTES: 5
- MITRE: T1110, T1550

## Objective

Validate brute-force resistance, session integrity, and MFA enforcement.

## Required Workflow

1. Validate scope before any active action and reject out-of-scope targets.
2. Run only authorized checks aligned to PTES, OWASP WSTG, NIST SP 800-115, and MITRE ATT&CK.
3. Write findings in canonical finding_schema format with reproducible PoC notes.
4. Honor dry-run mode and require explicit --i-have-authorization for live execution.
5. Export deterministic artifacts for downstream skill consumption.

## Execution

```bash
python skills/pentest-auth-bypass/scripts/auth_bypass.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run
```

## Outputs

- `auth-findings.json`
- `valid-sessions.json`
- `auth-attack-report.json`

## References

- `references/tools.md`
- `skills/autonomous-pentester/shared/scope_schema.json`
- `skills/autonomous-pentester/shared/finding_schema.json`

## Legal and Ethical Notice

```text
WARNING AUTHORIZED USE ONLY
This skill executes real security testing tools against live targets.
Use only with written authorization.

```

Related Skills

pentest-c2-operator

3891
from openclaw/skills

Set up authorized C2 simulation workflows and measure defensive detection outcomes.

Security

pentest-api-attacker

3891
from openclaw/skills

Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.

Security

pentest-active-directory

3891
from openclaw/skills

Assess Active Directory identity attack paths including roasting, relay, and delegation abuse.

Security

nmap-pentest-scans

3891
from openclaw/skills

Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.

Security

HIPAA Compliance for AI Agents

3891
from openclaw/skills

Generate HIPAA compliance checklists, risk assessments, and audit frameworks for healthcare organizations deploying AI agents.

Security

Data Governance Framework

3891
from openclaw/skills

Assess, score, and remediate your organization's data governance posture across 6 domains.

Security

Cybersecurity Risk Assessment

3891
from openclaw/skills

You are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework.

Security

afrexai-cybersecurity-engine

3891
from openclaw/skills

Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident response, or building security programs from scratch. Works with any stack — zero external dependencies.

Security

Compliance & Audit Readiness Engine

3891
from openclaw/skills

Your AI compliance officer. Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS — from zero to audit-ready. No consultants needed.

Security

Compliance Audit Generator

3891
from openclaw/skills

Run internal compliance audits against major frameworks without hiring a consultant.

Security

AI Safety Audit

3891
from openclaw/skills

Comprehensive AI safety and alignment audit framework for businesses deploying AI agents. Built around the UK AI Security Institute Alignment Project standards (2026), EU AI Act requirements, and NIST AI RMF.

Security

clickhouse-github-forensics

3891
from openclaw/skills

Query GitHub event data via ClickHouse for supply chain investigations, actor profiling, and anomaly detection. Use when investigating GitHub-based attacks, tracking repository activity, analyzing actor behavior patterns, detecting tag/release tampering, or reconstructing incident timelines from public GitHub data. Triggers on GitHub supply chain attacks, repo compromise investigations, actor attribution, tag poisoning, or "query github events".

Security