bugbounty_vulnerability_hunting
Generate prioritized vulnerability hunting workflows for bug bounty programs by focusing on high-impact security issues like RCE, SQLi, and XSS to maximize bounty potential.
Instructions
Create vulnerability hunting workflow prioritized by impact and bounty potential.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
bounty_range | No | unknown | |
domain | Yes | ||
priority_vulns | No | rce,sqli,xss,idor,ssrf |
Input Schema (JSON Schema)
{
"properties": {
"bounty_range": {
"default": "unknown",
"title": "Bounty Range",
"type": "string"
},
"domain": {
"title": "Domain",
"type": "string"
},
"priority_vulns": {
"default": "rce,sqli,xss,idor,ssrf",
"title": "Priority Vulns",
"type": "string"
}
},
"required": [
"domain"
],
"type": "object"
}