ghost-validate

Installation
Summary

Validate security findings by analyzing code flows, testing exploit conditions, and confirming true vs. false positives.

  • Traces request flows from route registration through middleware to handler logic, identifying indirect protections scanners may miss
  • Performs live validation against accessible application instances using proxy-based request replay and response comparison
  • Classifies findings into True Positive, True Positive (Confirmed), False Positive, or Inconclusive with supporting evidence and confidence levels
  • Outputs structured validation reports with code analysis, live test results, and specific remediation recommendations
  • Optionally appends validation details back to the original finding file for persistent documentation
SKILL.md

Security Finding Validation

Determine whether a security finding is a true positive or false positive. Produce a determination with supporting evidence.

Input

The user provides a finding as a file path or pasted text. If neither is provided, ask for one.

Extract: vulnerability class, specific claim, affected endpoint, code location, and any existing validation evidence.

Validation Workflow

Step 1: Understand the Finding

Identify:

  • The vulnerability class (BFLA, BOLA, XSS, SQLi, SSRF, etc.)
  • The specific claim being made (what authorization check is missing, what input is unsanitized, etc.)
  • The affected endpoint and HTTP method
  • The code location
Related skills

More from ghostsecurity/skills

Installs
1.4K
GitHub Stars
409
First Seen
Feb 20, 2026