Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research
npx skills add https://github.com/transilienceai/communitytools --skill domain-assessmentCLI를 사용하여 이 스킬을 설치하고 작업 공간에서 SKILL.md 워크플로 사용을 시작하세요.
Open-source Claude Code skills and agents for AI-powered penetration testing, bug bounty hunting, AI threat testing, and security reconnaissance — from the team at Transilience.ai
Quick Start | Skills | Architecture | Contributing | Website
Practice Makes Perfect: Teaching an AI to Hack by Learning from Its Mistakes (March 2026)
We built an autonomous pentesting agent that scores 100% (104/104) on a published CTF benchmark suite — using only structured markdown skill files, no fine-tuning. Starting from a bare 89.4% baseline, we ran a simple loop roughly 15 times: run the benchmarks, find a failure, diagnose the missing technique, write it into a skill file, and run again. The same skills transfer cross-model: Claude Sonnet 4.6 reaches 96.2% and Claude Haiku 4.5 reaches 62.5%. This repository contains the full skill set described in the paper.
Transilience AI Community Tools is a consolidated Claude Code security testing suite — 26 skills and 3 tool integrations that cover the full penetration testing lifecycle from reconnaissance to reporting. Agent roles (coordinator, executor, validator) are defined in skills/coordination/ with reference material in skills/coordination/reference/, and spawned dynamically via Agent(prompt=...).
npm install -g @playwright/mcp && npx playwright install chromiumenv-reader.py, nvd-lookup.py, slack-send.py)A single script spins up a Kali Linux container with Claude Code, Playwright (headed via Xvfb), and all Kali security tools pre-installed:
bash scripts/kali-claude-setup.sh projects/pentest
This builds a Docker image with Kali Rolling + Node.js + Claude Code + Playwright + Chromium, mounts the project workspace, and launches Claude Code with --dangerously-skip-permissions. Use --rebuild to force a fresh image build.
git clone https://github.com/transilienceai/communitytools.git
cd communitytools/projects/pentest
claude # Launch Claude Code from the projects/pentest directory
Then use slash commands inside the Claude session:
Pentest https://target.com # Full penetration test (skills/coordination/)
/hackthebox # HackTheBox challenge automation
/hackerone # Bug bounty workflow
/techstack-identification # Passive tech stack recon
/reconnaissance target.com # Attack surface mapping
/source-code-scanning ./app # Static code analysis
All canonical skill and tool definitions live at the repo root (skills/, tools/). Each project under projects/ symlinks only the ones it needs — see Repository Structure for details.
Agent roles (coordinator, executor, validator) are defined in skills/coordination/ with reference material in skills/coordination/reference/, spawned dynamically via Agent(prompt=...).
| Skill | Coverage |
|---|---|
/injection |
SQL, NoSQL, OS Command, SSTI, XXE, LDAP/XPath |
/client-side |
XSS (Reflected/Stored/DOM), CSRF, Clickjacking, CORS, Prototype Pollution |
/server-side |
SSRF, HTTP Smuggling, Path Traversal, File Upload, Deserialization, Host Header |
/authentication |
Auth Bypass, JWT, OAuth, Password Attacks, 2FA Bypass, CAPTCHA Bypass |
/api-security |
GraphQL, REST API, WebSockets, Web LLM |
/web-app-logic |
Business Logic, Race Conditions, Access Control, Cache Poisoning/Deception, IDOR |
/cloud-containers |
AWS, Azure, GCP, Docker, Kubernetes |
/system |
Active Directory, Privilege Escalation (Linux/Windows), Exploit Development |
/infrastructure |
Port Scanning, DNS, MITM, VLAN Hopping, IPv6, SMB/NetBIOS |
/social-engineering |
Phishing, Pretexting, Vishing, Physical Security |
| Skill | Purpose |
|---|---|
/reconnaissance |
Subdomain discovery, port scanning, endpoint enumeration, API discovery, attack surface mapping |
/osint |
Repository enumeration, secret scanning, git history analysis, employee footprint |
/techstack-identification |
Passive tech stack inference across 17 intelligence domains |
| Skill | Purpose |
|---|---|
/ai-threat-testing |
OWASP LLM Top 10 — prompt injection, model extraction, data poisoning, supply chain |
/blockchain-security |
Smart contract security, EVM storage, delegatecall, CREATE/CREATE2, DeFi exploits |
/cve-poc-generator |
CVE research, NVD lookup, safe Python PoC generation, vulnerability reports |
/dfir |
Digital forensics, incident response, Windows event logs, PCAP analysis, AD attack detection |
/source-code-scanning |
SAST — OWASP Top 10, CWE Top 25, dependency CVEs, hardcoded secrets |
| Skill | Purpose |
|---|---|
/hackerone |
Scope CSV parsing, parallel asset testing, PoC validation, platform-ready submissions |
/hackthebox |
Playwright-based login, challenge browsing, VPN management, automated solving |
| Skill | Purpose |
|---|---|
/essential-tools |
Burp Suite, Playwright automation, methodology, reporting standards |
/patt-fetcher |
On-demand payload extraction from PayloadsAllTheThings |
/script-generator |
Optimized, syntax-validated script generation |
formats/transilience-report-style |
Transilience-branded PDF report generation (ReportLab) |
/github-workflow |
Git branching, commits, PRs, issues, code review |
/skill-update |
Skill scaffolding, validation, GitHub workflow automation |
| Tool | Purpose |
|---|---|
| Playwright | Browser automation for client-side testing via MCP |
| Kali Linux Tools | nmap, masscan, nikto, gobuster, ffuf, sqlmap, testssl, and more |
| NVD / CVE Risk Score | Auto-invoked CVE lookup (/cve-risk-score) — CVSS score, severity, CWE from NVD |
Local Model Context Protocol servers that expose Transilience APIs to MCP-capable clients (Claude Desktop, Cline, Zed, etc.). Each server is self-contained under mcp/<name>/ with its own pyproject.toml and install instructions.
| Server | Purpose |
|---|---|
mcp/transilience-vuln |
Single-CVE and bulk CVE enrichment (CVSS, EPSS, KEV, impact taxonomy, vendor advisories) via the Transilience Vulnerability API. |
The suite uses a skills-only architecture with canonical definitions at the repo root, symlinked into isolated project environments:
skills/ at root, symlinked into each project's .claude/skills/) — User-triggered workflows invoked with /skill-name. Each skill contains a SKILL.md definition and reference/ directory with attack techniques, cheat sheets, payloads, and agent role prompts.skills/coordination/) — Defines the 3 agent roles (coordinator, executor, validator) as a skill with role-based context injection. Read at runtime and passed to Agent(prompt=...).tools/ at root, symlinked into each project's .claude/tools/) — Utility scripts for environment reading, integrations.sequenceDiagram
participant User
participant Coord as Coordinator (inline)
participant Roles as Role Definitions (skills/coordination/)
participant Agents as Spawned Agents
participant Output as Standardized Outputs
User->>Coord: Pentest https://target.com
Coord->>Roles: Read skills/coordination/SKILL.md
Coord->>Coord: Execute coordinator workflow inline
Coord->>Roles: Read skills/coordination/reference/executor-role.md
Coord->>Agents: Agent(prompt=executor_role + chain + skills) × N
Note over Agents: SQL/XSS/SSRF/JWT/OAuth/SSTI/XXE...
Agents-->>Output: findings/*.json + evidence/*.png
Coord->>Roles: Read skills/coordination/reference/validator-role.md
Coord->>Agents: Agent(prompt=validator_role + evidence ONLY) × N
Note over Agents: Blind review — no attack chain context
Agents-->>Output: validated/*.json
Coord->>Output: Phase 6: Generate reports
Output-->>User: Executive + technical reports
communitytools/
├── CLAUDE.md # Project instructions
├── marketplace.json # Machine-readable project manifest
├── papers/ # Research papers
├── benchmarks/ # XBOW benchmark runner
│
├── skills/ # ← Canonical skill definitions (source of truth)
│ ├── coordination/ # ← Agent roles + coordination reference
│ │ ├── SKILL.md # Coordinator logic (entry point)
│ │ └── reference/
│ │ ├── executor-role.md # Executor role prompt
│ │ ├── validator-role.md # Validator role prompt (blind review)
│ │ ├── context-injection.md # What context each role receives
│ │ ├── ATTACK_INDEX.md # 53 attack types mapped to skills
│ │ ├── OUTPUT_STRUCTURE.md # Engagement output directory spec
│ │ ├── VALIDATION.md # 5-check finding validation framework
│ │ ├── GIT_CONVENTIONS.md # Branch/commit/PR standards
│ │ └── PATT_STANDARD.md # PayloadsAllTheThings integration
│ ├── injection/
│ │ ├── SKILL.md
│ │ └── reference/
│ ├── reconnaissance/
│ ├── server-side/
│ └── ... # 27 skill directories total
│
├── tools/ # ← Canonical tool integrations (source of truth)
│ ├── env-reader.py
│ └── slack-send.py
│
└── projects/ # ← Isolated project environments
└── pentest/
└── .claude/
├── skills/ # Real directory, contents are symlinks
│ ├── injection/ → ../../../../skills/injection/
│ └── ... # Each project picks what it needs
└── tools/ # Real directory, contents are symlinks
├── env-reader.py → ../../../../tools/env-reader.py
└── ...
Canonical root directories (skills/, tools/) hold the single source of truth for all definitions. No duplication, no drift.
Project directories (projects/) are isolated environments designed to be run independently with claude from within the project folder. Each project has its own .claude/ directory with real skills/ and tools/ folders — but the contents are symlinks pointing back to the canonical sources.
This design gives you:
claude from projects/pentest/ and it discovers only the skills that project has symlinked.skills/, and every project that symlinks it gets the update immediately.Adding a new project:
mkdir -p projects/myproject/.claude/{skills,tools}
cd projects/myproject/.claude/skills
# Symlink only the skills this project needs
ln -s ../../../../skills/injection injection
# Coordination is a skill like any other — symlink if needed
ln -s ../../../../skills/coordination coordination
ln -s ../../../../skills/reconnaissance reconnaissance
# ... add more as needed
# Same for tools
cd ../tools
ln -s ../../../../tools/env-reader.py env-reader.py
We welcome contributions from the security community!
Read the full guide: CONTRIBUTING.md
Quick path using Skill Update:
/skill-update
# Select: CREATE → provide details → automated GitHub workflow
# Handles: issue creation, branch, skill generation, validation, commit, PR
IMPORTANT: These tools are designed for authorized security testing ONLY.
Authorized & Legal Use:
Prohibited & Illegal Use:
Users are solely responsible for compliance with all applicable laws and regulations.
If you discover a vulnerability using these tools:
| Category | Count |
|---|---|
| Skills | 27 |
| Role Prompts | 3 (in coordination skill) |
| Tool Integrations | 3 |
| Attack Types | 53 |
| Reference Files | 160+ |
Coverage:
MIT License — Copyright (c) 2026 Transilience AI. See LICENSE for details.
Built by Transilience AI
We build AI-driven cloud security and compliance automation. These open-source tools reflect how we think about security — if you're curious about the platform behind them, take a look.
Website | Issues | Discussions
claude-code ai-security penetration-testing bug-bounty owasp llm-security ai-threat-testing security-automation ethical-hacking cybersecurity appsec web-security hackerone hackthebox multi-agent