> fuzzing-apis
This skill enables Claude to perform automated fuzz testing on APIs to discover vulnerabilities, crashes, and unexpected behavior. It leverages malformed inputs, boundary values, and random payloads to generate comprehensive fuzz test suites. Use this skill when you need to identify potential SQL injection, XSS, command injection vulnerabilities, input validation failures, and edge cases in APIs. Trigger this skill by requesting fuzz testing, vulnerability scanning, or security analysis of an AP
curl "https://skillshub.wtf/jeremylongshore/claude-code-plugins-plus-skills/api-fuzzer?format=md"Overview
This skill allows Claude to conduct automated fuzz testing on REST APIs. It identifies potential security flaws and robustness issues by injecting various malformed inputs, boundary values, and random data.
How It Works
- Input Generation: The skill generates a diverse set of test inputs, including malformed data, boundary values, and random payloads.
- API Interaction: It sends these inputs to the specified API endpoints.
- Result Analysis: It analyzes the API's responses and behavior to identify vulnerabilities, crashes, and unexpected results, such as SQL injection errors or XSS vulnerabilities.
When to Use This Skill
This skill activates when you need to:
- Identify potential security vulnerabilities in an API.
- Test the robustness of an API against unexpected inputs.
- Ensure proper input validation is implemented in an API.
Examples
Example 1: Discovering SQL Injection Vulnerability
User request: "Fuzz test the /users endpoint for SQL injection vulnerabilities."
The skill will:
- Generate SQL injection payloads.
- Send these payloads to the /users endpoint.
- Analyze the API's responses for SQL errors or unexpected behavior indicating a SQL injection vulnerability.
Example 2: Testing Input Validation
User request: "Fuzz test the /products endpoint to check for input validation issues with price and quantity parameters."
The skill will:
- Generate malformed inputs for price and quantity (e.g., negative values, extremely large numbers, non-numeric characters).
- Send these inputs to the /products endpoint.
- Analyze the API's responses for errors or unexpected behavior, indicating input validation failures.
Best Practices
- Specificity: Be specific about the API endpoint or parameters you want to fuzz.
- Context: Provide context about the expected behavior of the API.
- Iteration: Run multiple fuzzing sessions with different input sets for thorough testing.
Integration
This skill can be used in conjunction with other security analysis tools to provide a more comprehensive assessment of an API's security posture. It can also be integrated into a CI/CD pipeline to automate security testing.
> related_skills --same-repo
> fathom-cost-tuning
Optimize Fathom API usage and plan selection. Trigger with phrases like "fathom cost", "fathom pricing", "fathom plan".
> fathom-core-workflow-b
Sync Fathom meeting data to CRM and build automated follow-up workflows. Use when integrating Fathom with Salesforce, HubSpot, or custom CRMs, or creating automated post-meeting email summaries. Trigger with phrases like "fathom crm sync", "fathom salesforce", "fathom follow-up", "fathom post-meeting workflow".
> fathom-core-workflow-a
Build a meeting analytics pipeline with Fathom transcripts and summaries. Use when extracting insights from meetings, building CRM sync, or creating automated meeting follow-up workflows. Trigger with phrases like "fathom analytics", "fathom meeting pipeline", "fathom transcript analysis", "fathom action items sync".
> fathom-common-errors
Diagnose and fix Fathom API errors including auth failures and missing data. Use when API calls fail, transcripts are empty, or webhooks are not firing. Trigger with phrases like "fathom error", "fathom not working", "fathom api failure", "fix fathom".