bug-reaperWeb2 bug bounty hunting agent — evidence-based vulnerability finder and report writer. Use when: auditing web apps/APIs for HackerOne, Bugcrowd, Intigriti, Y...
Install via ClawdBot CLI:
clawdbot install shaniidev/bug-reaperGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses sensitive credential files or environment variables
~/.ssh/id_rsaSends data to undocumented external endpoint (potential exfiltration)
POST → https://target.com/api/account/emailPotentially destructive shell commands in tool definitions
eval(Accesses system directories or attempts privilege escalation
/var/log/Generated Mar 21, 2026
A security researcher uses the agent to systematically audit a web application within the scope of a platform like HackerOne or Bugcrowd. The agent guides them through recon, vulnerability hunting, and validation to produce a report with confirmed medium+ severity bugs, ensuring findings are triage-ready.
A developer downloads a GitHub repository locally and triggers the agent for a white-box audit. The agent analyzes the source code for vulnerabilities such as IDOR, SQL injection, or auth bypasses, supplementing with black-box testing if applicable, to identify exploitable flaws before deployment.
An API tester focuses on auditing REST or GraphQL endpoints for vulnerabilities like BOLA, BFLA, or mass assignment. The agent provides structured methodologies and payloads to test for access control issues and business logic flaws, ensuring realistic impact and working PoCs.
A penetration tester employs the agent during a authorized security audit of a web application. Following the 4-phase workflow, they recon the target, hunt for high-ROI vulnerabilities like SSRF or XSS, validate findings, and generate detailed reports for client remediation.
A security analyst uses the agent to validate potential vulnerabilities discovered during scanning. The agent helps trace input paths, bypass defenses, and confirm exploitable conditions, ensuring only real bugs with attacker-controlled input and impact are reported.
Independent researchers or teams use the agent to efficiently find and report vulnerabilities on platforms like Intigriti or YesWeHack. By focusing on confirmed medium+ severity bugs, they maximize bounty payouts while minimizing false positives and time spent on low-impact findings.
Cybersecurity firms integrate the agent into their service offerings for client audits and penetration testing. It standardizes vulnerability discovery, ensures thorough validation, and helps produce professional reports, enhancing service quality and client trust.
Organizations use the agent as a training tool for their security teams to practice real-world bug hunting and audit skills. It provides structured workflows and reference materials, helping teams improve their ability to identify and mitigate web vulnerabilities.
💬 Integration Tip
Ensure the user has explicit authorization for targets, as the agent emphasizes scope verification and ethical testing to avoid legal issues.
Scored Apr 19, 2026
Calls external URL not in known-safe list
https://github.com/shaniidev/bug-reaperAudited Apr 18, 2026 · audit v1.0
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.
Test your AI agent for security vulnerabilities using PwnClaw. Runs 50+ attacks (prompt injection, jailbreaks, social engineering, MCP poisoning, and more) and provides fix instructions. Use when your agent needs a security check or hardening.