bugbounty_vulnerability_hunting
Generate prioritized vulnerability hunting workflows for bug bounty programs by focusing on high-impact security issues like RCE, SQLi, and XSS to maximize bounty potential.
Instructions
Create vulnerability hunting workflow prioritized by impact and bounty potential.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
bounty_range | No | unknown | |
domain | Yes | ||
priority_vulns | No | rce,sqli,xss,idor,ssrf |