Resolve common penetration testing issues in Ark. Use when fixing security vulnerabilities from pentest reports, security audits, or OWASP Top 10 issues.
View on GitHubmckinsey/agents-at-scale-ark
ark
January 21, 2026
Select agents to install to:
npx add-skill https://github.com/mckinsey/agents-at-scale-ark/blob/main/.claude/skills/pentest-issue-resolver/SKILL.md -a claude-code --skill ark-pentest-issue-resolverInstallation paths:
.claude/skills/ark-pentest-issue-resolver/# Ark Penetration Test Issue Resolver
Provides detection patterns, mitigation strategies, and fixes for common penetration testing issues found in the Ark platform.
## When to use this skill
Use this skill when:
- User reports a penetration testing finding without a specific CVE
- Security audit reveals OWASP Top 10 vulnerabilities
- User mentions issues like "XSS", "SQL injection", "CSRF", etc.
- Need to identify and fix common security misconfigurations
**Note**: This skill is used by the **ark-security-patcher** agent when no specific CVE is mentioned. It helps identify and resolve standard penetration testing findings.
## Common Penetration Test Issues
### 1. SQL Injection
**Description**: Attacker can inject malicious SQL queries through user input.
**Detection Patterns**:
```python
# VULNERABLE: Direct string concatenation
query = f"SELECT * FROM users WHERE username = '{username}'"
# VULNERABLE: String formatting
query = "SELECT * FROM users WHERE id = %s" % user_id
```
**Mitigation**:
```python
# SECURE: Use parameterized queries
cursor.execute("SELECT * FROM users WHERE username = ?", (username,))
# SECURE: Use ORM with parameter binding
User.objects.filter(username=username)
# SECURE: Use sqlalchemy with bound parameters
session.query(User).filter(User.username == username)
```
**Ark Context**:
- Check Python services: `services/ark-api/`, executor services
- Search for: `cursor.execute`, `db.query`, SQL string concatenation
- Verify all database queries use parameterized statements
---
### 2. Cross-Site Scripting (XSS)
**Description**: Attacker can inject malicious JavaScript into web pages viewed by other users.
**Types**:
- **Reflected XSS**: Malicious script in URL/request is reflected in response
- **Stored XSS**: Malicious script stored in database and displayed to users
- **DOM-based XSS**: Vulnerability exists in client-side JavaScript
**Detection Patterns**:
```javascript
// VULNERABLE: Direct innerHTML manipulation
element.innerIssues Found: