Skip to content

shuvonsec/claude-bug-bounty

Repository files navigation

v3.0.0

Claude Bug Bounty

The AI-Powered Agent Harness for Professional Bug Bounty Hunting

Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.


License: MIT Python 3.8+ Tests Claude Code


Quick Start  |  How It Works  |  Commands  |  What's New  |  Install


  13 commands  ·  7 AI agents  ·  7 skill domains
  20 web2 vuln classes  ·  10 web3 bug classes
  Burp MCP  ·  HackerOne MCP  ·  Autonomous Mode



The Problem

Most bug bounty toolkits give you a bag of scripts. You still have to:

  • Figure out what to test and in what order
  • Waste hours on false positives that get rejected
  • Write reports from scratch every time
  • Forget what worked on previous targets
  • Context-switch between 15 different terminal windows

The Solution

Claude Bug Bounty is an agent harness — not just scripts. It reasons about what to test, validates findings before you waste time writing them up, remembers what worked across targets, and generates reports that actually get paid.


Before After
Run scripts manually, hope for the best AI orchestrates 25+ tools in the right order
Write reports from scratch (45 min each) Report-writer agent generates submission-ready reports in 60s
Forget what worked last month Persistent memory — patterns from target A inform target B
Can't see live traffic from Claude Burp MCP integration — Claude reads your proxy history
Hunt one endpoint at a time /autopilot runs full hunt loops with safety checkpoints



Quick Start

Step 1 — Install

git clone https://github.com/shuvonsec/claude-bug-bounty.git
cd claude-bug-bounty
chmod +x install.sh && ./install.sh

Step 2 — Hunt

claude                          # Start Claude Code

/recon target.com               # Discover attack surface
/hunt target.com                # Test for vulnerabilities
/validate                       # Check finding before writing
/report                         # Generate submission-ready report

Step 3 — Go Autonomous (new in v3)

/autopilot target.com --normal  # Full autonomous hunt loop
/intel target.com               # Fetch CVE + disclosure intel
/resume target.com              # Pick up where you left off

Or run tools directly — no Claude needed:

python3 tools/hunt.py --target target.com
./tools/recon_engine.sh target.com
python3 tools/intel_engine.py --target target.com --tech nextjs



How It Works

                         YOU
                          |
                    ┌─────▼─────┐
                    │   Claude   │ ◄── Burp MCP (sees your traffic)
                    │   Code     │ ◄── HackerOne MCP (program intel)
                    └─────┬─────┘
                          |
          ┌───────────────┼───────────────┐
          |               |               |
    ┌─────▼─────┐  ┌──────▼──────┐  ┌────▼────┐
    │   Recon    │  │    Hunt     │  │ Report  │
    │   Agent    │  │   Engine    │  │ Writer  │
    └─────┬─────┘  └──────┬──────┘  └────┬────┘
          |               |               |
    subfinder        scope check      H1/Bugcrowd
    httpx            vuln test        Intigriti
    katana           validate         Immunefi
    nuclei           chain A→B→C      CVSS 3.1
          |               |               |
    ┌─────▼───────────────▼───────────────▼─────┐
    │              Hunt Memory                   │
    │  journal · patterns · audit · rate limit   │
    └───────────────────────────────────────────-─┘

Each stage feeds the next. Claude orchestrates everything, or you run any stage independently.




Commands

Core Workflow

Command What It Does
/recon target.com Full recon — subdomains, live hosts, URLs, nuclei scan
/hunt target.com Active testing — scope check, tech detect, test highest-ROI bugs
/validate 7-Question Gate + 4 gates — PASS / KILL / DOWNGRADE / CHAIN REQUIRED
/report Submission-ready report for H1/Bugcrowd/Intigriti/Immunefi
/chain Find B and C from bug A — systematic exploit chaining
/scope <asset> Verify asset is in scope before testing
/triage Quick 2-minute go/no-go before deep validation
/web3-audit <contract> 10-class smart contract checklist + Foundry PoC

Autonomous & Memory (new in v3)

Command What It Does
/autopilot target.com Full autonomous hunt loop with safety checkpoints
/surface target.com AI-ranked attack surface from recon + memory
/resume target.com Resume previous hunt — shows what's untested
/remember Save finding or pattern to persistent memory
/intel target.com CVEs + disclosures cross-referenced with your hunt history



AI Agents

7 specialized agents, each tuned for its role:

Agent What It Does Model
recon-agent Subdomain enum, live hosts, URL crawl, nuclei Haiku (fast)
report-writer Professional reports, impact-first, human tone Opus (quality)
validator 7-Question Gate + 4-gate finding validation Sonnet
web3-auditor 10-class contract audit + Foundry PoC stubs Sonnet
chain-builder Systematic A-B-C exploit chaining Sonnet
autopilot Autonomous hunt loop with circuit breaker Sonnet
recon-ranker Attack surface ranking from recon + memory Haiku (fast)



What's New in v3.0.0

The "brain in a jar" is now a bionic hacker.

Autonomous Hunt Loop/autopilot

7-step loop that runs continuously: scope - recon - rank - hunt - validate - report - checkpoint

Three checkpoint modes:

  • --paranoid — stops after every finding for your review
  • --normal — batches findings, checkpoints every few minutes
  • --yolo — minimal stops (still requires approval for report submissions)

Built-in safety: circuit breaker stops hammering hosts after consecutive failures, per-host rate limiting, every request logged to audit.jsonl.

Persistent Hunt Memory — remember everything
  • Journal — append-only JSONL log of every hunt action (concurrent-safe writes)
  • Pattern DB — what technique worked on which tech stack, sorted by payout
  • Target profiles — tested/untested endpoints, tech stack, findings
  • Cross-target learning — patterns from target A suggested when hunting target B
MCP Integrations — Burp + HackerOne

Burp Suite MCP — Claude can read your proxy history, replay requests through Burp, use Collaborator payloads. Your AI copilot now sees the same traffic you do.

HackerOne MCP — Public API integration:

  • search_disclosed_reports — search Hacktivity by keyword or program
  • get_program_stats — bounty ranges, response times, resolved counts
  • get_program_policy — scope, safe harbor, excluded vuln classes
On-Demand Intel/intel

Wraps learn.py + HackerOne MCP + hunt memory:

  • Flags untested CVEs matching the target's tech stack
  • Shows new endpoints not in your tested list
  • Surfaces cross-target patterns from your own hunt history
  • Prioritizes: CRITICAL untested > HIGH untested > already tested
Deterministic Scope Safety

scope_checker.py uses anchored suffix matching — code check, not LLM judgment:

  • *.target.com matches api.target.com but NOT evil-target.com
  • Excluded domains always win over wildcards
  • IP addresses rejected with warning (match by domain only)
  • Every test filtered through scope before execution



Vulnerability Coverage

20 Web2 Bug Classes — click to expand
Class Key Techniques Typical Payout
IDOR Object-level, field-level, GraphQL node(), UUID enum, method swap $500 - $5K
Auth Bypass Missing middleware, client-side checks, BFLA $1K - $10K
XSS Reflected, stored, DOM, postMessage, CSP bypass, mXSS $500 - $5K
SSRF Redirect chain, DNS rebinding, cloud metadata, 11 IP bypasses $1K - $15K
Business Logic Workflow bypass, negative quantity, price manipulation $500 - $10K
Race Conditions TOCTOU, coupon reuse, limit overrun, double spend $500 - $5K
SQLi Error-based, blind, time-based, ORM bypass, WAF bypass $1K - $15K
OAuth/OIDC Missing PKCE, state bypass, 11 redirect_uri bypasses $500 - $5K
File Upload Extension bypass, MIME confusion, polyglots, 10 bypasses $500 - $5K
GraphQL Introspection, node() IDOR, batching bypass, mutation auth $1K - $10K
LLM/AI Prompt injection, chatbot IDOR, ASI01-ASI10 framework $500 - $10K
API Misconfig Mass assignment, JWT attacks, prototype pollution, CORS $500 - $5K
ATO Password reset poisoning, token leaks, 9 takeover paths $1K - $20K
SSTI Jinja2, Twig, Freemarker, ERB, Thymeleaf -> RCE $2K - $10K
Subdomain Takeover GitHub Pages, S3, Heroku, Netlify, Azure $200 - $5K
Cloud/Infra S3 listing, EC2 metadata, Firebase, K8s, Docker API $500 - $20K
HTTP Smuggling CL.TE, TE.CL, TE.TE, H2.CL request tunneling $5K - $30K
Cache Poisoning Unkeyed headers, parameter cloaking, web cache deception $1K - $10K
MFA Bypass No rate limit, OTP reuse, response manipulation, race $1K - $10K
SAML/SSO XSW, comment injection, signature stripping, XXE $2K - $20K
10 Web3 Bug Classes — click to expand
Class Frequency Typical Payout
Accounting Desync 28% of Criticals $50K - $2M
Access Control 19% of Criticals $50K - $2M
Incomplete Code Path 17% of Criticals $50K - $2M
Off-By-One 22% of Highs $10K - $100K
Oracle Manipulation 12% of reports $100K - $2M
ERC4626 Attacks Moderate $50K - $500K
Reentrancy Classic $10K - $500K
Flash Loan Moderate $100K - $2M
Signature Replay Moderate $10K - $200K
Proxy/Upgrade Moderate $50K - $2M



Tools & Architecture

Core Pipelinetools/
Tool What It Does
hunt.py Master orchestrator — chains recon, scan, report
recon_engine.sh Subdomain enum + DNS + live hosts + URL crawl
learn.py CVE + disclosure intel from NVD, GitHub Advisory, HackerOne
intel_engine.py Memory-aware intel wrapper (learn.py + HackerOne MCP + memory)
validate.py 4-gate validation — scope, impact, dedup, CVSS
report_generator.py H1/Bugcrowd/Intigriti report output
scope_checker.py Deterministic scope safety with anchored suffix matching
mindmap.py Prioritized attack mindmap generator
Vulnerability Scannerstools/
Tool Target
h1_idor_scanner.py Object-level and field-level IDOR
h1_mutation_idor.py GraphQL mutation IDOR
h1_oauth_tester.py OAuth misconfigs (PKCE, state, redirect_uri)
h1_race.py Race conditions (TOCTOU, limit overrun)
zero_day_fuzzer.py Logic bugs, edge cases, access control
cve_hunter.py Tech fingerprinting + known CVE matching
vuln_scanner.sh Orchestrates nuclei + dalfox + sqlmap
hai_probe.py AI chatbot IDOR, prompt injection
hai_payload_builder.py Prompt injection payload generator
MCP Integrationsmcp/
Server Tools Provided
Burp Suite (burp-mcp-client/) Read proxy history, replay requests, Collaborator payloads
HackerOne (hackerone-mcp/) search_disclosed_reports, get_program_stats, get_program_policy
Hunt Memory Systemmemory/
Module What It Does
hunt_journal.py Append-only JSONL hunt log (concurrent-safe via fcntl.flock)
pattern_db.py Cross-target pattern DB — matches by vuln class + tech stack
audit_log.py Every outbound request logged + per-host rate limiter + circuit breaker
schemas.py Schema validation for all entry types (versioned)
Full Directory Structure — click to expand
claude-bug-bounty/
├── skills/                     7 skill domains (SKILL.md files)
├── commands/                   13 slash commands
├── agents/                     7 specialized AI agents
├── tools/                      21 Python/shell tools
├── memory/                     Persistent hunt memory system
├── mcp/                        MCP server integrations
│   ├── burp-mcp-client/        Burp Suite proxy
│   └── hackerone-mcp/          HackerOne public API
├── tests/                      129 tests
├── rules/                      Always-active hunting + reporting rules
├── hooks/                      Session start/stop hooks
├── docs/                       Payload arsenal + technique guides
├── web3/                       Smart contract skill chain
├── scripts/                    Shell wrappers
└── wordlists/                  5 wordlists



Installation

Prerequisites

# macOS
brew install go python3 node jq

# Linux (Debian/Ubuntu)
sudo apt install golang python3 nodejs jq

Install

git clone https://github.com/shuvonsec/claude-bug-bounty.git
cd claude-bug-bounty
chmod +x install.sh && ./install.sh

API Keys

Chaos API (required for recon)
  1. Sign up at chaos.projectdiscovery.io
  2. Export your key:
export CHAOS_API_KEY="your-key-here"
echo 'export CHAOS_API_KEY="your-key-here"' >> ~/.zshrc
Optional API keys (better subdomain coverage)

Configure in ~/.config/subfinder/config.yaml:




The Golden Rules

These are always active. Non-negotiable.

 1. READ FULL SCOPE        verify every asset before the first request
 2. NO THEORETICAL BUGS    "Can attacker do this RIGHT NOW?" — if no, stop
 3. KILL WEAK FAST         Gate 0 is 30 seconds, saves hours
 4. NEVER OUT-OF-SCOPE     one request = potential ban
 5. 5-MINUTE RULE          nothing after 5 min = move on
 6. RECON ONLY AUTO        manual testing finds unique bugs
 7. IMPACT-FIRST           "worst thing if auth broken?" drives target selection
 8. SIBLING RULE           9 endpoints have auth? check the 10th
 9. A→B SIGNAL             confirming A means B exists nearby — hunt it
10. VALIDATE FIRST         7-Question Gate (15 min) before report (30 min)



The Trilogy

Repo Purpose
claude-bug-bounty Full hunting pipeline — recon to report
web3-bug-bounty-hunting-ai-skills Smart contract security — 10 bug classes, Foundry PoCs
public-skills-builder Ingest 500+ writeups into Claude skill files



Contributing

PRs welcome. Best contributions:

  • New vulnerability scanners or detection modules
  • Payload additions to skills/security-arsenal/SKILL.md
  • New agent definitions for specific platforms
  • Real-world methodology improvements (with evidence from paid reports)
  • Platform support (YesWeHack, Synack, HackenProof)
git checkout -b feature/your-contribution
git commit -m "Add: short description"
git push origin feature/your-contribution



Connect

GitHub   |   Twitter   |   LinkedIn   |   Email



For authorized security testing only. Only test targets within an approved bug bounty scope.
Never test systems without explicit permission. Follow responsible disclosure practices.



MIT License

Built by bug hunters, for bug hunters.

If this helped you find a bug, leave a star.

About

AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Code.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors