What is JavaScript Analysis in Bug Bounty?

Web applications load JavaScript files that contain security-relevant information: API endpoints, hidden parameters, feature flags, API keys, and application logic. Traditional tools like LinkFinder use regex patterns to extract URLs from JS files. They find endpoints but miss context.

AI-assisted analysis differs. Instead of pattern matching, Claude reads and understands what the JavaScript code actually does. It identifies authenticated endpoints, accepted parameters, hidden features, and exploitable secrets.

What regex-based tools miss:

  • Context about authentication requirements

  • Parameter validation rules

  • Feature flags that enable admin functions

  • API keys with scope and expiration details

  • Application logic flows

What AI provides:

  • Understanding of code structure

  • Identification of relationships between endpoints

  • Detection of hidden or beta features

  • Analysis of authentication and authorization patterns

  • Prioritization based on exploitability

Result: 1 prompt replaces 10+ manual steps

Prerequisites & Setup

You'll need the Burp MCP setup first. If you haven't configured Claude Code with Burp Suite, start here:

CLAUDE.md Template for JS Analysis

  • Create a file CLAUDE.md
    Then copy below content

# JavaScript Security Analysis

## Target
- **Domain:** vulnerable-app.com
- **Scope:** *.vulnerable-app.com

## Analysis Priorities
Focus on finding:
1. Admin/internal/debug endpoints not linked in UI
2. API keys, tokens, or credentials with production scope
3. Feature flags that enable hidden functionality
4. Parameters that bypass security controls (debug, test_mode, bypass_*)
5. Undocumented API endpoints with sensitive data access

## Known Context
- **Auth:** JWT-based, tokens expire in 1 hour
- **Stack:** React frontend, Node.js backend, MongoDB
- **Interesting Paths:** /api/v1/ (legacy), /api/v2/ (current)

## Output Requirements
- Save findings to ./findings/YYYY-MM-DD_target.md
- Include: file path, line number, code snippet, severity, next steps
- Format: markdown tables with copy-pasteable proof of concept

## Validation Rules
- Never report secrets without testing them first
- Confirm endpoints accept documented parameters
- Check if feature flags change server-side behavior

JavaScript Analysis Methodology

JavaScript files contain different categories of security-relevant information. Each has different analysis techniques and security impact.

Category

Examples

Security Impact

Endpoints

/api/admin/users, /internal/debug

Discover hidden entry points

Hidden Parameters

debug=true, role=admin, test=1

Bypass access controls

Hidden Features

Feature flags, beta endpoints, admin panels

Access unauthorized functionality

API Keys

apiKey: "sk-...", AWS keys, JWT tokens

Account takeover, data exfiltration

Developer Comments

TODOs, debug code, password hints

Information disclosure

Application Logic

Auth flows, permission checks, validation rules

Logic bypass, privilege escalation

Step-by-Step

Step 1: Filter JavaScript from Burp HTTP History

What you're trying to do: Extract all JavaScript files that Burp has captured during browsing. This gives Claude the raw material for analysis.

Prompt: Send below prompt to Claude Code

Task: Extract JavaScript files from Burp Suite Proxy history via Burp MCP

Target domain: vulnerable-app.com

Process:
1. Query the Burp MCP proxy history
2. Filter requests belonging to vulnerable-app.com
3. Identify URLs ending with ".js"
4. Extract the full URL & file size of each JavaScript file
5. Deduplicate results

Output: List of JavaScript file URLs

What happens: Claude queries Burp proxy history, filters for .js file extensions and application/javascript MIME types, then returns a structured list with URLs and response sizes.

Example output:

Filtered JS file

Step 2: Perform Deep Analysis

What you're trying to do: Run a security analysis on all JavaScript files from target vulnerable-app.com. Claude reads each file, extracts security-relevant information, and categorizes findings.

Prompt: Send below prompt to Claude Code

Analyze all JavaScript files from above for security-relevant
information

Look for:

1. API endpoints (especially admin, internal, debug, test endpoints)
2. Hidden parameters (debug, test, admin, role, bypass flags)
3. Hardcoded secrets (API keys, tokens, passwords, private keys)
4. Feature flags that enable hidden functionality
5. Developer comments with sensitive information
6. Authentication and authorization logic

For each finding, provide:
- The specific file and approximate location
- The exact string or code snippet
- Why it's security-relevant
- Suggested next steps for testing

What happens: Claude reads each JavaScript file from Burp history, parses code structure, identifies patterns, extracts security-relevant findings, and provides actionable recommendations.

Example output:

Findings found during JS analysis

Step 3: Review Findings Summary

What you're trying to do: Get a prioritized summary of all findings from the vulnerable-app.com analysis with severity ratings and recommended actions.

Prompt: Send below prompt to Claude Code

Create a prioritized summary of all JavaScript analysis findings.
Rate each finding by severity (Critical/High/Medium/Low) and
provide specific next steps for testing.

Example output:

Finding review

Findings Summary

#

Finding

Severity

File

Next Steps

1

Client-side auth bypass via window.userRole

Critical

dashboard.js

Test server-side authorization

2

Hidden admin endpoints in JS

High

dashboard.js

Direct access as regular user

3

User enumeration via /api/v2/users

High

dashboard.js

Fetch as non-admin user

4

IDOR in inventory API (id parameter)

High

dashboard.js

Modify other users' items

5

Undocumented delete user function

Medium

dashboard.js

Test DELETE /api/v2/users/{id}

6

Legacy /api/v1/ may exist

Low

login.js

Fuzz v1 endpoints

Follow Up Prompts

After the initial analysis, use these prompts to validate and expand findings:

Validate Findings Automatically

Test the hidden admin endpoints directly. Use my current session cookie and report if access is granted or denied

Endpoints to test:

- /backend/admin/users-management
- /backend/admin/audit-logs

Generate Burp Repeater Tabs

Create Burp Repeater tabs for all high-severity findings from the analysis
Include the full HTTP request with my current session cookie

Test IDOR Vulnerability

Test the IDOR in /api/v2/inventory by:

Getting the inventory list
Attempting to modify an item with a different id
Report whether the modification succeeds.

What Could Be Better

Custom Skill for JavaScript Analysis

Build a dedicated Claude Code skill that standardizes JS analysis:

# js-analysis skill

## Purpose
Analyze JavaScript files from Burp history for security findings.

## Workflow
1. Filter JS files from proxy history
2. Extract and categorize findings
3. Prioritize by exploitability
4. Generate Burp Repeater tabs for validation
5. Create findings report

## Output Format
- Markdown tables for findings
- Severity ratings (Critical/High/Medium/Low)
- Copy-pasteable proof of concept

Wordlist Integration

Connect external resources for better analysis:

  • SecLists - Common parameter names, API patterns

  • PayloadsAllTheThings - Known vulnerable patterns

  • Custom wordlists - Project-specific sensitive strings

Automated Validation

Cut down manual verification:

  • Auto-test discovered API keys against known endpoints

  • Generate Repeater tabs for each finding

  • Run parameter fuzzing on discovered endpoints

  • Check secret validity with API calls

Historical Comparison

Track changes across sessions:

  • Diff JavaScript files between visits

  • Alert on new secrets or endpoints

  • Detect removed security controls

  • Monitor for newly exposed functionality

Conclusion

JavaScript analysis with Claude Code goes beyond regex pattern matching. Traditional tools find endpoints. AI understands what those endpoints do, how they're protected, and whether they're worth testing.

The workflow: capture JS files during browsing, run an analysis prompt, review prioritized findings, and validate manually. This approach has found hardcoded credentials, hidden admin panels, and undocumented APIs in production applications.

Subscribe for more security automation content: https://labs.secengai.com/

Further Reading

MCP Servers:

Skills & Agents:

Config Management:

Config Reference:

Keep Reading