web-front-scannerPerform a thorough client-side / browser-facing security assessment of a target web application. Use this skill whenever the user asks to pentest, audit, or...
Install via ClawdBot CLI:
clawdbot install enderphan94/web-front-scannerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 22, 2026
An online retailer wants to ensure their checkout and user account pages are secure from client-side attacks like XSS and clickjacking before a major sale. The skill scans JavaScript bundles for exposed API keys and validates CORS settings to protect customer data.
A financial technology company needs a frontend security review to identify vulnerabilities such as JWT leakage in localStorage and insecure third-party scripts that could compromise transaction integrity. The assessment focuses on non-destructive validation of client-side logic.
A healthcare provider requires a security audit of their patient portal to detect sensitive data exposure in source maps and ensure compliance with privacy regulations. The skill checks for prototype pollution and CSRF risks in frontend request patterns.
A software-as-a-service company seeks to identify client-side vulnerabilities like DOM-based XSS and open redirects in their web application to prevent data breaches. The review includes analyzing static assets for hardcoded secrets and outdated libraries.
An online learning platform wants to test for clickjacking and mixed content issues that could affect user trust. The skill performs passive analysis of JavaScript dependencies and validates iframe sandboxing configurations.
Offer ongoing client-side security assessments as a monthly subscription, providing regular reports on vulnerabilities and updates. Revenue is generated through tiered pricing based on scan frequency and target complexity.
Provide specialized pentesting services for specific projects or compliance needs, charging a fixed fee per assessment. This model targets businesses requiring ad-hoc security reviews before product launches.
Integrate the skill into a broader security platform that automates scans and offers remediation guidance. Revenue comes from licensing fees and premium features like CVE matching and detailed analytics.
💬 Integration Tip
Ensure the target URL is correctly set and use browser DevTools for manual validation alongside automated tools to reduce false positives.
Scored Apr 19, 2026
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Test your AI agent for security vulnerabilities using PwnClaw. Runs 50+ attacks (prompt injection, jailbreaks, social engineering, MCP poisoning, and more) and provides fix instructions. Use when your agent needs a security check or hardening.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.