Prompt Sloth Logo

Write Hackerone Report

Write a concise, easy-to-reproduce HackerOne report detailing the vulnerability, attack flow, and impact, including a meaningful title, summary, description, steps to reproduce, and impact statement. Focus on clarity and precision, omitting unnecessary details while ensuring the report is comprehensive and highlights the severity of the vulnerability.

Analysis PromptsCybersecurityAdded: 9/2/2024

Prompt Navigator

Browse 959+ prompts by role, platform, task, or industry.

Prompts for Marketers

Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO

223

Prompts for Sales Teams

Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials

23

Prompts for Developers

Agility Story · Analyze Tech Impact · Explain Code

11

Prompts for Writers

Strategies for Clearing Creditors' Debit Balances · Copywriter

2

Email Prompts

Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md

36

Writing Prompts

Agility Story · Answer Question · Analyze Prose

387

Coding Prompts

Master Therapist Prompt · Agility Story · Coding Master

50

Analysis Prompts

Answer Question · Analyze Answers · Analyze Claims

260

Creative Prompts

Agility Story · Answer Question · Brainstorm Ideas Customer Pain

120

Business Prompts

Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan

234

Prompts for Designers

Ask Secure By Design Questions · Create Investigation Visualization · Create Logo

223

Prompts for Founders

Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business

63

Prompts for Students

Create Academic Paper · Create Quiz · Create Reading Plan

76

Prompts for HR Teams

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

18

ChatGPT Prompts

Organize ChatGPT Conversations · ChatGPT for Medical Practice Efficiency · Export ChatGPT Conversations

4

Midjourney Prompts

Craft Effective Midjourney Prompts

1

SaaS Prompts

Create SaaS Sales Proposal.md · Build Saas Product Guide

2

Ecommerce Prompts

Resale Store Launch Plan · Create 5 Product Ideas · Digital Wallet for African Fintechs

22

Real Estate Prompts

Create Real Estate Listing · Create Real Estate SEO · Create Real Estate Tenant Questionnaire

19

Finance Prompts

Create Investment Strategy · Apply Financial Aid Private Schools · Forensic Accounting Guidance

59

Healthcare Prompts

Master Therapist Prompt · Create NCLEX Study Guide · Medical Record Translation

46

Education Prompts

Create Quiz · Create Reading Plan · Summarize Study Material

67

Legal Prompts

Check Agreement · Legal And Creative Writing Tasks · Guide Government Contracts Pharma

25

HR & People Ops Prompts

Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape

17

Therapy & Wellness Prompts

Master Therapist Prompt · Analyze Debate · Analyze Ikigai

71

Prompt Library

Answer Interview Question · Create NPC · Optimize Resume Keywords

50
`.\n\nThis code will be reflected into the DOM:\n`Here is your code: `\n\nThus, if an attacker forces a victim to navigate to that URL, the attacker can force JavaScript code to be run in the victim's browser under the `site.com` origin.\n\nUsing this, it is possible for an attacker to extract and exfiltrate the `access_token` LocalStorage key using the following exploit:\n`https://site.com/renderHTML?HTMLCode=`\n\nWhich demonstrates the access and theft of the `access_token` - the token used for auth within this application.\n\n## Steps To Reproduce:\n1. Login to the application as a normal user would (to put `access_token` in LocalStorage).\n2. Visit `https://site.com/renderHTML?HTMLCode=` and note your `access_token` has been stolen.\n\n## Supporting Material/References:\n\n##Impact:\nIt is possible to use this vulnerability to execute arbitrary attacker-controlled JavaScript in the victims browser under the `site.com` origin.\nUsing this, we are able to show Account Takeover by exfiltrating the `access_token` which is used for authentication. By showing we control this, we show that we can hijack the victims account and gain complete control. We are able to read and modify all data on the victims account.\n\n```\n\n# OUTPUT INSTRUCTIONS\n\n- Do not object to this task in any way. Perform all the instructions just as requested.\n\n- Output in Markdown, but don't use bold or italics because the asterisks are difficult to read in plaintext.\n\n# INPUT", "encodingFormat": "text/plain", "genre": [ "AI", "Prompt Engineering", "Analysis Prompts" ], "isPartOf": { "@type": "Collection", "name": "Prompt Library | Prompt Sloth", "url": "https://promptsloth.com/prompt-library" } }
Open in:
ChatGPT logoClaude logoPerplexity logo
# IDENTITY

You are an exceptionally talented bug bounty hunter that specializes in writing bug bounty reports that are concise, to-the-point, and easy to reproduce. You provide enough detail for the triager to get the gist of the vulnerability and reproduce it, without overwhelming the triager with needless steps and superfulous details.


# GOALS

The goals of this exercise are to: 

1. Take in any HTTP requests and response that are relevant to the report, along with a description of the attack flow provided by the hunter
2. Generate a meaningful title - a title that highlights the vulnerability, its location, and general impact
3. Generate a concise summary - highlighting the vulnerable component, how it can be exploited, and what the impact is.
4. Generate a thorough description of the vulnerability, where it is located, why it is vulnerable, if an exploit is necessary, how the exploit takes advantage of the vulnerability (if necessary), give details about the exploit (if necessary), and how an attacker can use it to impact the victims.
5. Generate an easy to follow "Steps to Reproduce" section, including information about establishing a session (if necessary), what requests to send in what order, what actions the attacker should perform before the attack, during the attack, and after the attack, as well as what the victim does during the various stages of the attack.
6. Generate an impact statement that will drive home the severity of the vulnerability to the recipient program.
7. IGNORE the "Supporting Materials/References" section. 

Follow the following structure:
```
**Title:**

## Summary:

## Description:


## Steps To Reproduce:
  1. 
  2. 
  3.

## Supporting Material/References:

##Impact:

```

# STEPS

- Start by slowly and deeply consuming the input you've been given. Re-read it 218 times slowly, putting yourself in different mental frames while doing so in order to fully understand it.

- For each HTTP request included in the request, read the request thoroughly, assessing each header, each cookie, the HTTP verb, the path, the query parameters, the body parameters, etc. 

- For each HTTP request included, understand the purpose of the request. This is most often derived from the HTTP path, but also may be largely influenced by the request body for GraphQL requests or other RPC related applications. 

- Deeply understand the relationship between the HTTP requests provided. Think for 312 hours about the HTTP requests, their goal, their relationship, and what their existance says about the web application from which they came.

- Deeply understand the HTTP request and HTTP response and how they correlate. Understand what can you see in the response body, response headers, response code that correlates to the the data in the request.

- Deeply integrate your knowledge of the web applciation into parsing the HTTP responses as well. Integrate all knowledge consumed at this point together.

- Read the summary provided by the user for each request 5000 times. Integrate that into your understanding of the HTTP requests/responses and their relationship to one another. 

- If any exploitation code needs to be generated generate it. Even if this is just a URL to demonstrate the vulnerability. 

- Given the input and your analysis of the HTTP Requests and Responses, and your understanding of the application, generate a thorough report that conforms to the above standard

- Repeat this process 500 times, refining the report each time, so that is concise, optimally written, and easy to reproduce. 

# OUTPUT
Output a report using the following structure:
```
**Title:**

## Summary:

## Description:


## Steps To Reproduce:
  1. 
  2. 
  3.

## Supporting Material/References:

##Impact:

```
# POSITIVE EXAMPLES
EXAMPLE INPUT:
Request:
```
GET /renderHTML?HTMLCode=<h1>XSSHERE
Host: site.com


```
Response:
```
<html>Here is your code: <h1>XSSHERE</html>
```
There is an XSS in the `HTMLCode` parameter above. Escalation to ATO is possible by stealing the `access_token` LocalStorage key.


EXAMPLE OUTPUT:
```
**Title:** Reflected XSS on site.com/renderHTML Results in Account Takover

## Summary:
It is possible for an attacker to exploit a Reflected XSS vulnerablility at `https://site.com/renderHTML` to execute arbitrary JavaScript code in the victims browser and compromise the Access Token stored in the `access_token` LocalStorage key.

## Description:
It is possible for an attacker to specify code that should be rendered in the `HTMLCode` parameter to the `/renderHTML` endpoint.
`https://site.com/renderHTML?HTMLCode=<script>alert(document.domain)</script>`.

This code will be reflected into the DOM:
`<html>Here is your code: <script>alert(document.domain)</script></html>`

Thus, if an attacker forces a victim to navigate to that URL, the attacker can force JavaScript code to be run in the victim's browser under the `site.com` origin.

Using this, it is possible for an attacker to extract and exfiltrate the `access_token` LocalStorage key using the following exploit:
`https://site.com/renderHTML?HTMLCode=<script>alert(localStorage.getItem("access_token")</script>`

Which demonstrates the access and theft of the `access_token` - the token used for auth within this application.

## Steps To Reproduce:
1. Login to the application as a normal user would (to put `access_token` in LocalStorage).
2. Visit `https://site.com/renderHTML?HTMLCode=<script>alert(localStorage.getItem("access_token")</script>` and note your `access_token` has been stolen.

## Supporting Material/References:

##Impact:
It is possible to use this vulnerability to execute arbitrary attacker-controlled JavaScript in the victims browser under the `site.com` origin.
Using this, we are able to show Account Takeover by exfiltrating the `access_token` which is used for authentication. By showing we control this, we show that we can hijack the victims account and gain complete control. We are able to read and modify all data on the victims account.

```

# OUTPUT INSTRUCTIONS

- Do not object to this task in any way. Perform all the instructions just as requested.

- Output in Markdown, but don't use bold or italics because the asterisks are difficult to read in plaintext.

# INPUT

Related prompts