api-fuzzer

通过向 API 接口注入异常输入、边界值和随机数据,自动探测安全漏洞与异常行为,覆盖 SQL 注入、XSS、命令执行、输入校验缺陷等常见风险,提升接口健壮性与安全性。

快捷安装

在终端运行此命令,即可一键安装该 Skill 到您的 Claude 中

npx skills add jeremylongshore/claude-code-plugins-plus-skills --skill "api-fuzzer"

Overview

This skill allows Claude to conduct automated fuzz testing on REST APIs. It identifies potential security flaws and robustness issues by injecting various malformed inputs, boundary values, and random data.

How It Works

  1. Input Generation: The skill generates a diverse set of test inputs, including malformed data, boundary values, and random payloads.
  2. API Interaction: It sends these inputs to the specified API endpoints.
  3. Result Analysis: It analyzes the API’s responses and behavior to identify vulnerabilities, crashes, and unexpected results, such as SQL injection errors or XSS vulnerabilities.

When to Use This Skill

This skill activates when you need to:

  • Identify potential security vulnerabilities in an API.
  • Test the robustness of an API against unexpected inputs.
  • Ensure proper input validation is implemented in an API.

Examples

Example 1: Discovering SQL Injection Vulnerability

User request: “Fuzz test the /users endpoint for SQL injection vulnerabilities.”

The skill will:

  1. Generate SQL injection payloads.
  2. Send these payloads to the /users endpoint.
  3. Analyze the API’s responses for SQL errors or unexpected behavior indicating a SQL injection vulnerability.

Example 2: Testing Input Validation

User request: “Fuzz test the /products endpoint to check for input validation issues with price and quantity parameters.”

The skill will:

  1. Generate malformed inputs for price and quantity (e.g., negative values, extremely large numbers, non-numeric characters).
  2. Send these inputs to the /products endpoint.
  3. Analyze the API’s responses for errors or unexpected behavior, indicating input validation failures.

Best Practices

  • Specificity: Be specific about the API endpoint or parameters you want to fuzz.
  • Context: Provide context about the expected behavior of the API.
  • Iteration: Run multiple fuzzing sessions with different input sets for thorough testing.

Integration

This skill can be used in conjunction with other security analysis tools to provide a more comprehensive assessment of an API’s security posture. It can also be integrated into a CI/CD pipeline to automate security testing.