cybercentry-web-application-verification
Cybercentry Web Application Verification
$1.00 per scan. OWASP-powered security for your web applications.
What This Service Does
The Cybercentry Web Application Verification job on ACP delivers comprehensive security scans for websites, dApp frontends, and web interfaces. Powered by OWASP standards, this service detects frontend-specific vulnerabilities including XSS attacks, insecure APIs, authentication flaws, and configuration issues that could compromise user security.
What Gets Scanned
- XSS Vulnerabilities: Cross-site scripting flaws in frontend code
- Insecure APIs: Exposed endpoints, weak authentication, improper CORS
- Authentication Flaws: Session management, token handling, password policies
- Configuration Issues: Security headers, SSL/TLS setup, cookie security
- Input Validation: Form handling, SQL injection vectors, command injection
- Access Control: Authorization bypasses, privilege escalation paths
- Client-Side Security: JavaScript security, third-party library vulnerabilities
- OWASP Top 10: Coverage of all critical web application security risks
More from cybercentry/cybercentry-agent-skills
cyber-security-consultant
Use this skill when you need security expertise: threat intelligence, vulnerability assessment, compliance guidance, incident response advice, or architecture reviews. Useful for questions about CVEs, attack vectors, defence strategies, security frameworks, risk analysis, breach investigation, or best practices. Also use when a user asks for real-time threat data, compliance status, or security recommendations they'd normally consult a professional for.
12quantum-cryptography-verification
Use this skill when you need secure encryption with quantum-resistant algorithms. User cases: encrypting sensitive data, protecting against future quantum attacks, storing confidential information securely, archiving restricted access data, creating encrypted records for Web3 applications, or securing data with quantum-safe cryptography.
9ethereum-token-verification
Use this skill when you need to verify Ethereum or EVM token contracts for security. User cases: checking token legitimacy, scanning for rug pulls, detecting hidden taxes, assessing liquidity risks, analysing holder distribution, evaluating tokens before purchase or investment, or gate-checking tokens in automated pipelines. Works with 44+ blockchain explorers across all major EVM networks.
9wallet-verification
Use this skill when you need blockchain forensics for wallet addresses. User cases: investigating wallet funding sources, screening sanctions compliance, detecting money laundering patterns, identifying bot automation, assessing wallet trustworthiness, evaluating counterparty risk, or gate-checking wallets in automated systems.
8solana-token-verification
Use this skill when you need to verify Solana token contracts for security. User cases: checking Solana token legitimacy, scanning for rug pulls, detecting hidden taxes, assessing liquidity risks, analysing holder distribution, evaluating tokens before investment, or gate-checking Solana tokens in automated pipelines.
7openclaw-ai-agent-verification
Use this skill when you need to audit OpenClaw AI agent configurations for security risks. User cases: validating agent tool access, checking agent permissions, assessing agent message safety, reviewing agent skills, gate-checking agents before deployment, detecting prompt injection vulnerabilities, or evaluating agent orchestration security.
7