> cat /dev/github | grep security-tools
discovered 30 Mar 2026

claude-bug-bounty

Python ★ 1282 via github-topic
→ View on GitHub

AI Summary: Claude Bug Bounty is an AI-powered agent harness tailored for professional bug bounty hunting, enabling users to streamline their testing processes. It intelligently orchestrates over 25 tools, remembers past findings across targets, validates vulnerabilities to reduce false positives, and generates ready-to-submit reports in under a minute. Notable features include Burp MCP integration for live traffic monitoring and an autonomous hunting mode that simplifies the testing workflow.


README

v3.0.0

Claude Bug Bounty

The AI-Powered Agent Harness for Professional Bug Bounty Hunting

Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.


License: MIT Python 3.8+ Tests Claude Code


Quick Start  |  How It Works  |  Commands  |  What’s New  |  Install


  13 commands  ·  7 AI agents  ·  8 skill domains
  20 web2 vuln classes  ·  10 web3 bug classes
  Burp MCP  ·  HackerOne MCP  ·  Autonomous Mode



The Problem

Most bug bounty toolkits give you a bag of scripts. You still have to:

  • Figure out what to test and in what order
  • Waste hours on false positives that get rejected
  • Write reports from scratch every time
  • Forget what worked on previous targets
  • Context-switch between 15 different terminal windows

The Solution

Claude Bug Bounty is an agent harness — not just scripts. It reasons about what to test, validates findings before you waste time writing them up, remembers what worked across targets, and generates reports that actually get paid.


BeforeAfter
Run scripts manually, hope for the bestAI orchestrates 25+ tools in the right order
Write reports from scratch (45 min each)Report-writer agent generates submission-ready reports in 60s
Forget what worked last monthPersistent memory — patterns from target A inform target B
Can’t see live traffic from ClaudeBurp MCP integration — Claude reads your proxy history
Hunt one endpoint at a time/autopilot runs full hunt loops with safety checkpoints



Quick Start

Step 1 — Install

git clone https://github.com/shuvonsec/claude-bug-bounty.git
cd claude-bug-bounty
chmod +x install.sh && ./install.sh

Step 2 — Hunt

claude                          # Start Claude Code

/recon target.com               # Discover attack surface
/hunt target.com                # Test for vulnerabilities
/validate                       # Check finding before writing
/report                         # Generate submission-ready report

Step 3 — Go Autonomous (new in v3)

/autopilot target.com --normal  # Full autonomous hunt loop
/intel target.com               # Fetch CVE + disclosure intel
/resume target.com              # Pick up where you left off

Or run tools directly — no Claude needed:

python3 tools/hunt.py --target target.com
./tools/recon_engine.sh target.com
python3 tools/intel_engine.py --target target.com --tech nextjs



How It Works

                         YOU
                          |
                    ┌─────▼─────┐
                    │   Claude   │ ◄── Burp MCP (sees your traffic)
                    │   Code     │ ◄── HackerOne MCP (program intel)
                    └─────┬─────┘
                          |
          ┌───────────────┼───────────────┐
          |               |               |
    ┌─────▼─────┐  ┌──────▼──────┐  ┌────▼────┐
    │   Recon    │  │    Hunt     │  │ Report  │
    │   Agent    │  │   Engine    │  │ Writer  │
    └─────┬─────┘  └──────┬──────┘  └────┬────┘
          |               |               |
    subfinder        scope check      H1/Bugcrowd
    httpx            vuln test        Intigriti
    katana           validate         Immunefi
    nuclei           chain A→B→C      CVSS 3.1
          |               |               |
    ┌─────▼───────────────▼───────────────▼─────┐
    │              Hunt Memory                   │
    │  journal · patterns · audit · rate limit   │
    └───────────────────────────────────────────-─┘

Each stage feeds the next. Claude orchestrates everything, or you run any stage independently.




Commands

Core Workflow

CommandWhat It Does
/recon target.comFull recon — subdomains, live hosts, URLs, nuclei scan
/hunt target.comActive testing — scope check, tech detect, test highest-ROI bugs
/validate7-Question Gate + 4 gates — PASS / KILL / DOWNGRADE / CHAIN REQUIRED
/reportSubmission-ready report for H1/Bugcrowd/Intigriti/Immunefi
/chainFind B and C from bug A — systematic exploit chaining
/scope <asset>Verify asset is in scope before testing
/triageQuick 2-minute go/no-go before deep validation
/web3-audit <contract>10-class smart contract checklist + Foundry PoC

Autonomous & Memory (new in v3)

CommandWhat It Does
/autopilot target.comFull autonomous hunt loop with safety checkpoints
/surface target.comAI-ranked attack surface from recon + memory
/resume target.comResume previous hunt — shows what’s untested
/rememberSave finding or pattern to persistent memory
/intel target.comCVEs + disclosures cross-referenced with your hunt history



AI Agents

7 specialized agents, each tuned for its role:

AgentWhat It DoesModel
recon-agentSubdomain enum, live hosts, URL crawl, nucleiHaiku (fast)
report-writerProfessional reports, impact-first, human toneOpus (quality)
validator7-Question Gate + 4-gate finding validationSonnet
web3-auditor10-class contract audit + Foundry PoC stubsSonnet
chain-builderSystematic A-B-C exploit chainingSonnet
autopilotAutonomous hunt loop with circuit breakerSonnet
recon-rankerAttack surface ranking from recon + memoryHaiku (fast)



What’s New in v3.0.0

The “brain in a jar” is now a bionic hacker.

Autonomous Hunt Loop/autopilot

7-step loop that runs continuously: scope - recon - rank - hunt - validate - report - checkpoint

Three checkpoint modes:

  • --paranoid — stops after every finding for your review
  • --normal — batches findings, checkpoints every few minutes
  • --yolo — minimal stops (still requires approval for report submissions)

Built-in safety: circuit breaker stops hammering hosts after consecutive failures, per-host rate limiting, every request logged to audit.jsonl.

Persistent Hunt Memory — remember everything
  • Journal — append-only JSONL log of every hunt action (concurrent-safe writes)
  • Pattern DB — what technique worked on which tech stack, sorted by payout
  • Target profiles — tested/untested endpoints, tech stack, findings
  • Cross-target learning — patterns from target A suggested when hunting target B
MCP Integrations — Burp + HackerOne

Burp Suite MCP — Claude can read your proxy history, replay requests through Burp, use Collaborator payloads. Your AI copilot now sees the same traffic you do.

HackerOne MCP — Public API integration:

  • search_disclosed_reports — search Hacktivity by keyword or program
  • get_program_stats — bounty ranges, response times, resolved counts
  • get_program_policy — scope, safe harbor, excluded vuln classes
On-Demand Intel/intel

Wraps learn.py + HackerOne MCP + hunt memory:

  • Flags untested CVEs matching the target’s tech stack
  • Shows new endpoints not in your tested list
  • Surfaces cross-target patterns from your own hunt history
  • Prioritizes: CRITICAL untested > HIGH untested > already tested
Deterministic Scope Safety

scope_checker.py uses anchored suffix matching — code check, not LLM judgment:

  • *.target.com matches api.target.com but NOT evil-target.com
  • Excluded domains always win over wildcards
  • IP addresses rejected with warning (match by domain only)
  • Every test filtered through scope before execution



Vulnerability Coverage

20 Web2 Bug Classes — click to expand
ClassKey TechniquesTypical Payout
IDORObject-level, field-level, GraphQL node(), UUID enum, method swap$500 - $5K
Auth BypassMissing middleware, client-side checks, BFLA$1K - $10K
XSSReflected, stored, DOM, postMessage, CSP bypass, mXSS$500 - $5K
SSRFRedirect chain, DNS rebinding, cloud metadata, 11 IP bypasses$1K - $15K
Business LogicWorkflow bypass, negative quantity, price manipulation$500 - $10K
Race ConditionsTOCTOU, coupon reuse, limit overrun, double spend$500 - $5K
SQLiError-based, blind, time-based, ORM bypass, WAF bypass$1K - $15K
OAuth/OIDCMissing PKCE, state bypass, 11 redirect_uri bypasses$500 - $5K
File UploadExtension bypass, MIME confusion, polyglots, 10 bypasses$500 - $5K
GraphQLIntrospection, node() IDOR, batching bypass, mutation auth$1K - $10K
LLM/AIPrompt injection, chatbot IDOR, ASI01-ASI10 framework$500 - $10K
API MisconfigMass assignment, JWT attacks, prototype pollution, CORS$500 - $5K
ATOPassword reset poisoning, token leaks, 9 takeover paths$1K - $20K
SSTIJinja2, Twig, Freemarker, ERB, Thymeleaf -> RCE$2K - $10K
Subdomain TakeoverGitHub Pages, S3, Heroku, Netlify, Azure$200 - $5K
Cloud/InfraS3 listing, EC2 metadata, Firebase, K8s, Docker API$500 - $20K
HTTP SmugglingCL.TE, TE.CL, TE.TE, H2.CL request tunneling$5K - $30K
Cache PoisoningUnkeyed headers, parameter cloaking, web cache deception$1K - $10K
MFA BypassNo rate limit, OTP reuse, response manipulation, race$1K - $10K
SAML/SSOXSW, comment injection, signature stripping, XXE$2K - $20K
10 Web3 Bug Classes — click to expand
ClassFrequencyTypical Payout
Accounting Desync28% of Criticals$50K - $2M
Access Control19% of Criticals$50K - $2M
Incomplete Code Path17% of Criticals$50K - $2M
Off-By-One22% of Highs$10K - $100K
Oracle Manipulation12% of reports$100K - $2M
ERC4626 AttacksModerate$50K - $500K
ReentrancyClassic$10K - $500K
Flash LoanModerate$100K - $2M
Signature ReplayModerate$10K - $200K
Proxy/UpgradeModerate$50K - $2M



Tools & Architecture

Core Pipelinetools/
ToolWhat It Does
hunt.pyMaster orchestrator — chains recon, scan, report
recon_engine.shSubdomain enum + DNS + live hosts + URL crawl
learn.pyCVE + disclosure intel from NVD, GitHub Advisory, HackerOne
intel_engine.pyMemory-aware intel wrapper (learn.py + HackerOne MCP + memory)
validate.py4-gate validation — scope, impact, dedup, CVSS
report_generator.pyH1/Bugcrowd/Intigriti report output
scope_checker.pyDeterministic scope safety with anchored suffix matching
mindmap.pyPrioritized attack mindmap generator
Vulnerability Scannerstools/
ToolTarget
h1_idor_scanner.pyObject-level and field-level IDOR
h1_mutation_idor.pyGraphQL mutation IDOR
h1_oauth_tester.pyOAuth misconfigs (PKCE, state, redirect_uri)
h1_race.pyRace conditions (TOCTOU, limit overrun)
zero_day_fuzzer.pyLogic bugs, edge cases, access control
cve_hunter.pyTech fingerprinting + known CVE matching
vuln_scanner.shOrchestrates nuclei + dalfox + sqlmap
hai_probe.pyAI chatbot IDOR, prompt injection
hai_payload_builder.pyPrompt injection payload generator
MCP Integrationsmcp/
ServerTools Provided
Burp Suite (burp-mcp-client/)Read proxy history, replay requests, Collaborator payloads
HackerOne (hackerone-mcp/)search_disclosed_reports, get_program_stats, get_program_policy
Hunt Memory Systemmemory/
ModuleWhat It Does
hunt_journal.pyAppend-only JSONL hunt log (concurrent-safe via fcntl.flock)
pattern_db.pyCross-target pattern DB — matches by vuln class + tech stack
audit_log.pyEvery outbound request logged + per-host rate limiter + circuit breaker
schemas.pySchema validation for all entry types (versioned)
Full Directory Structure — click to expand
claude-bug-bounty/
├── skills/                     8 skill domains (SKILL.md files)
├── commands/                   13 slash commands
├── agents/                     7 specialized AI agents
├── tools/                      21 Python/shell tools
├── memory/                     Persistent hunt memory system
├── mcp/                        MCP server integrations
│   ├── burp-mcp-client/        Burp Suite proxy
│   └── hackerone-mcp/          HackerOne public API
├── tests/                      129 tests
├── rules/                      Always-active hunting + reporting rules
├── hooks/                      Session start/stop hooks
├── docs/                       Payload arsenal + technique guides
├── web3/                       Smart contract skill chain
├── scripts/                    Shell wrappers
└── wordlists/                  5 wordlists



Installation

Prerequisites

# macOS
brew install go python3 node jq

# Linux (Debian/Ubuntu)
sudo apt install golang python3 nodejs jq

Install

git clone https://github.com/shuvonsec/claude-bug-bounty.git
cd claude-bug-bounty
chmod +x install.sh && ./install.sh

API Keys

Chaos API (required for recon)
  1. Sign up at chaos.projectdiscovery.io
  2. Export your key:
export CHAOS_API_KEY="your-key-here"
echo 'export CHAOS_API_KEY="your-key-here"' >> ~/.zshrc
Optional API keys (better subdomain coverage)

Configure in ~/.config/subfinder/config.yaml:




The Golden Rules

These are always active. Non-negotiable.

 1. READ FULL SCOPE        verify every asset before the first request
 2. NO THEORETICAL BUGS    "Can attacker do this RIGHT NOW?" — if no, stop
 3. KILL WEAK FAST         Gate 0 is 30 seconds, saves hours
 4. NEVER OUT-OF-SCOPE     one request = potential ban
 5. 5-MINUTE RULE          nothing after 5 min = move on
 6. RECON ONLY AUTO        manual testing finds unique bugs
 7. IMPACT-FIRST           "worst thing if auth broken?" drives target selection
 8. SIBLING RULE           9 endpoints have auth? check the 10th
 9. A→B SIGNAL             confirming A means B exists nearby — hunt it
10. VALIDATE FIRST         7-Question Gate (15 min) before report (30 min)



The Trilogy

RepoPurpose
claude-bug-bountyFull hunting pipeline — recon to report
web3-bug-bounty-hunting-ai-skillsSmart contract security — 10 bug classes, Foundry PoCs
public-skills-builderIngest 500+ writeups into Claude skill files



Contributing

PRs welcome. Best contributions:

  • New vulnerability scanners or detection modules
  • Payload additions to skills/security-arsenal/SKILL.md
  • New agent definitions for specific platforms
  • Real-world methodology improvements (with evidence from paid reports)
  • Platform support (YesWeHack, Synack, HackenProof)
git checkout -b feature/your-contribution
git commit -m "Add: short description"
git push origin feature/your-contribution



Connect

GitHub   |   Twitter   |   LinkedIn   |   Email



For authorized security testing only. Only test targets within an approved bug bounty scope.
Never test systems without explicit permission. Follow responsible disclosure practices.



MIT License

Built by bug hunters, for bug hunters.

If this helped you find a bug, leave a star.