pwn 0.4.405 → 0.4.409

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (61) hide show
  1. checksums.yaml +4 -4
  2. data/.ruby-version +1 -1
  3. data/Gemfile +4 -4
  4. data/README.md +5 -5
  5. data/Vagrantfile +3 -3
  6. data/bin/pwn_fuzz_net_app_proto +1 -1
  7. data/bin/pwn_sast +1 -1
  8. data/lib/pwn/plugins/metasploit.rb +2 -2
  9. data/lib/pwn/sast/amqp_connect_as_guest.rb +1 -1
  10. data/lib/pwn/sast/apache_file_system_util_api.rb +1 -1
  11. data/lib/pwn/sast/aws.rb +1 -1
  12. data/lib/pwn/sast/banned_function_calls_c.rb +1 -1
  13. data/lib/pwn/sast/base64.rb +1 -1
  14. data/lib/pwn/sast/beef_hook.rb +1 -1
  15. data/lib/pwn/sast/cmd_execution_java.rb +1 -1
  16. data/lib/pwn/sast/cmd_execution_python.rb +1 -1
  17. data/lib/pwn/sast/cmd_execution_ruby.rb +1 -1
  18. data/lib/pwn/sast/cmd_execution_scala.rb +1 -1
  19. data/lib/pwn/sast/csrf.rb +1 -1
  20. data/lib/pwn/sast/deserial_java.rb +1 -1
  21. data/lib/pwn/sast/emoticon.rb +1 -1
  22. data/lib/pwn/sast/eval.rb +1 -1
  23. data/lib/pwn/sast/factory.rb +1 -1
  24. data/lib/pwn/sast/file_permission.rb +1 -1
  25. data/lib/pwn/sast/http_authorization_header.rb +1 -1
  26. data/lib/pwn/sast/inner_html.rb +1 -1
  27. data/lib/pwn/sast/keystore.rb +1 -1
  28. data/lib/pwn/sast/location_hash.rb +1 -1
  29. data/lib/pwn/sast/log4j.rb +1 -1
  30. data/lib/pwn/sast/logger.rb +1 -1
  31. data/lib/pwn/sast/outer_html.rb +1 -1
  32. data/lib/pwn/sast/password.rb +1 -1
  33. data/lib/pwn/sast/pom_version.rb +1 -1
  34. data/lib/pwn/sast/port.rb +1 -1
  35. data/lib/pwn/sast/private_key.rb +1 -1
  36. data/lib/pwn/sast/redirect.rb +1 -1
  37. data/lib/pwn/sast/redos.rb +1 -1
  38. data/lib/pwn/sast/shell.rb +1 -1
  39. data/lib/pwn/sast/sql.rb +1 -1
  40. data/lib/pwn/sast/ssl.rb +1 -1
  41. data/lib/pwn/sast/sudo.rb +1 -1
  42. data/lib/pwn/sast/task_tag.rb +1 -1
  43. data/lib/pwn/sast/throw_errors.rb +1 -1
  44. data/lib/pwn/sast/token.rb +1 -1
  45. data/lib/pwn/sast/version.rb +1 -1
  46. data/lib/pwn/sast/window_location_hash.rb +1 -1
  47. data/lib/pwn/version.rb +1 -1
  48. data/packer/daemons/msfrpcd.rb +3 -3
  49. data/packer/kali_rolling_aws_ami.json +3 -3
  50. data/packer/kali_rolling_qemu_kvm.json +2 -2
  51. data/packer/kali_rolling_virtualbox.json +4 -4
  52. data/packer/kali_rolling_vmware.json +3 -3
  53. data/packer/provisioners/metasploit.rb +3 -3
  54. data/packer/provisioners/upload_globals.sh +1 -1
  55. data/vagrant/provisioners/burpsuite_pro.rb +3 -3
  56. data/vagrant/provisioners/jenkins_ssh-keygen.rb +3 -3
  57. data/vagrant/provisioners/kali_customize.rb +2 -2
  58. data/vagrant/provisioners/letsencrypt.rb +3 -3
  59. data/vagrant/provisioners/update_jenkins_plugins.rb +3 -3
  60. data/vagrant/provisioners/upload_globals.sh +1 -1
  61. metadata +12 -12
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: aab0b3fa754f1a39c2b4fbd6c88558ebc0e6b4728963298f564dfbda98850273
4
- data.tar.gz: 117f317acc9cc3296cb8e2f42890dd17046aaab8551c08f20a844e3e93392b35
3
+ metadata.gz: ae2da360fbd77bfb132cdb2def27d6706b6480cee191c54168dda853d4bf923f
4
+ data.tar.gz: 0e662e6d0d99a9de2d80ae0ba05b837e9f2beb56a91e958964173d59feab3fb3
5
5
  SHA512:
6
- metadata.gz: f3608d5ee4b161f788e2b3b2a8ae83f82adcd993b81da08018eed13ffb694e4db0dd1976f33e5a056f0f3b19929cf9f4ddad63604638159b6ea3d96d8095d6f3
7
- data.tar.gz: af0bad2f4d2d3ea3177e6766f873ad782d781e25729e44b709e55c35ce0640c3ed988b28dbc7b5bdbcdb25fd7c78bb671147495e53e564c57d22448f4dd8fcad
6
+ metadata.gz: 94d95a31df6cdb1d2d154f1869ad92f95fc7e8ba916bed4f9567ca7949798745c57ace2b55f5aff3b2063fb13556d5d05ee2a01da22afdf0ca5c5a2c9d0d3191
7
+ data.tar.gz: 50f9edd9f5aa97c20da131c97b142371818c5db2b10e7bd67bdf8c943a32dfa9b13e7dc037ecf1c9fdc6ec71e464c24369523742a4d3b69eb2ed9563d683915a
data/.ruby-version CHANGED
@@ -1 +1 @@
1
- 3.1.1
1
+ 3.1.2
data/Gemfile CHANGED
@@ -17,8 +17,8 @@ gem 'authy', '3.0.0'
17
17
  gem 'aws-sdk', '3.1.0'
18
18
  gem 'bettercap', '1.6.2'
19
19
  gem 'brakeman', '5.2.2'
20
- gem 'bson', '4.14.1'
21
- gem 'bundler', '>=2.3.11'
20
+ gem 'bson', '4.15.0'
21
+ gem 'bundler', '>=2.3.12'
22
22
  gem 'bundler-audit', '0.9.0.1'
23
23
  gem 'bunny', '2.19.0'
24
24
  gem 'colorize', '0.8.1'
@@ -58,9 +58,9 @@ gem 'rex', '2.0.13'
58
58
  gem 'rmagick', '4.2.5'
59
59
  gem 'rspec', '3.11.0'
60
60
  gem 'rtesseract', '3.1.2'
61
- gem 'rubocop', '1.27.0'
61
+ gem 'rubocop', '1.28.1'
62
62
  gem 'rubocop-rake', '0.6.0'
63
- gem 'rubocop-rspec', '2.9.0'
63
+ gem 'rubocop-rspec', '2.10.0'
64
64
  gem 'ruby-audio', '1.6.1'
65
65
  gem 'ruby-nmap', '0.10.0'
66
66
  gem 'ruby-saml', '1.14.0'
data/README.md CHANGED
@@ -31,13 +31,13 @@ Leveraging various pre-built modules and the pwn prototyper, you can mix-and-mat
31
31
  Tested on Linux, & OSX leveraging Ruby via RVM.
32
32
 
33
33
  ```
34
- $ rvm use ruby-3.1.1@global
34
+ $ rvm use ruby-3.1.2@global
35
35
  $ rvm gemset create pwn
36
- $ rvm use ruby-3.1.1@pwn
36
+ $ rvm use ruby-3.1.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.405]:001 >>> PWN.help
40
+ pwn[v0.4.409]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -48,11 +48,11 @@ pwn[v0.4.405]:001 >>> PWN.help
48
48
  It's wise to update pwn often as numerous versions are released/week:
49
49
  ```
50
50
  $ rvm list gemsets
51
- $ rvm use ruby-3.1.1@pwn
51
+ $ rvm use ruby-3.1.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.405]:001 >>> PWN.help
55
+ pwn[v0.4.409]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
data/Vagrantfile CHANGED
@@ -7,13 +7,13 @@ require 'pathname'
7
7
 
8
8
  API_VERSION = '2'
9
9
  pwn_root = Pathname.new(__FILE__).realpath.expand_path.parent
10
- vagrant_gui = ENV['VAGRANT_GUI'] if ENV['VAGRANT_GUI']
11
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
10
+ vagrant_gui = ENV.fetch('VAGRANT_GUI') if ENV.fetch('VAGRANT_GUI')
11
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
12
12
  runtime_userland = 'vagrant_rsync_userland_configs.lst'
13
13
  template_userland = "#{pwn_root}/vagrant_rsync_userland_template.lst"
14
14
 
15
15
  if pwn_provider == 'docker'
16
- docker_container_target = ENV['DOCKER_CONTAINER_TARGET'] if ENV['DOCKER_CONTAINER_TARGET']
16
+ docker_container_target = ENV.fetch('DOCKER_CONTAINER_TARGET') if ENV.fetch('DOCKER_CONTAINER_TARGET')
17
17
  docker_create_args = [
18
18
  '--interactive',
19
19
  '--tty'
@@ -77,7 +77,7 @@ if opts.empty?
77
77
  exit 1
78
78
  end
79
79
 
80
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
80
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
81
81
 
82
82
  dir_path = opts[:dir_path].to_s.scrub
83
83
  target = opts[:target]
data/bin/pwn_sast CHANGED
@@ -44,7 +44,7 @@ if opts.empty?
44
44
  end
45
45
 
46
46
  begin
47
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
47
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
48
48
 
49
49
  green = "\e[32m"
50
50
  end_of_color = "\e[0m"
@@ -17,8 +17,8 @@ module PWN
17
17
  if opts[:yaml_conf] && File.exist?(opts[:yaml_conf])
18
18
  yaml_conf = YAML.load_file(opts[:yaml_conf].to_s.strip.chomp.scrub)
19
19
  else
20
- pwn_root = ENV['PWN_ROOT'] if ENV['PWN_ROOT']
21
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
20
+ pwn_root = ENV.fetch('PWN_ROOT') if ENV.fetch('PWN_ROOT')
21
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
22
22
  yaml_conf = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/metasploit/vagrant.yaml")
23
23
  end
24
24
 
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'ACCOUNT MANAGEMENT',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-2'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-2'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -108,7 +108,7 @@ module PWN
108
108
  {
109
109
  sast_module: self,
110
110
  section: 'INFORMATION INPUT VALIDATION',
111
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
111
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
112
112
  }
113
113
  end
114
114
 
data/lib/pwn/sast/aws.rb CHANGED
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-8'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-8'
115
115
  }
116
116
  rescue StandardError => e
117
117
  raise e
@@ -236,7 +236,7 @@ module PWN
236
236
  {
237
237
  sast_module: self,
238
238
  section: 'INFORMATION INPUT VALIDATION',
239
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
239
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
240
240
  }
241
241
  end
242
242
 
@@ -112,7 +112,7 @@ module PWN
112
112
  {
113
113
  sast_module: self,
114
114
  section: 'PROTECTION OF INFORMATION AT REST',
115
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-28'
115
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
116
116
  }
117
117
  rescue StandardError => e
118
118
  raise e
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'MALICIOUS CODE PROTECTION',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
110
110
  }
111
111
  rescue StandardError => e
112
112
  raise e
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'INFORMATION INPUT VALIDATION',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
115
115
  }
116
116
  rescue StandardError => e
117
117
  raise e
@@ -113,7 +113,7 @@ module PWN
113
113
  {
114
114
  sast_module: self,
115
115
  section: 'INFORMATION INPUT VALIDATION',
116
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
116
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
117
117
  }
118
118
  rescue StandardError => e
119
119
  raise e
@@ -121,7 +121,7 @@ module PWN
121
121
  {
122
122
  sast_module: self,
123
123
  section: 'INFORMATION INPUT VALIDATION',
124
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
124
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
125
125
  }
126
126
  rescue StandardError => e
127
127
  raise e
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'INFORMATION INPUT VALIDATION',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
115
115
  }
116
116
  rescue StandardError => e
117
117
  raise e
data/lib/pwn/sast/csrf.rb CHANGED
@@ -107,7 +107,7 @@ module PWN
107
107
  {
108
108
  sast_module: self,
109
109
  section: 'MALICIOUS CODE PROTECTION',
110
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
110
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
111
111
  }
112
112
  end
113
113
 
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'INFORMATION INPUT VALIDATION',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
110
110
  }
111
111
  end
112
112
 
@@ -114,7 +114,7 @@ module PWN
114
114
  {
115
115
  sast_module: self,
116
116
  section: 'LEAST PRIVILEGE',
117
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-6'
117
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
118
118
  }
119
119
  rescue StandardError => e
120
120
  raise e
data/lib/pwn/sast/eval.rb CHANGED
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'MALICIOUS CODE PROTECTION',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'DEVELOPER CONFIGURATION MANAGEMENT',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SA-10'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-10'
110
110
  }
111
111
  end
112
112
 
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'LEAST PRIVILEGE',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-6'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
115
115
  }
116
116
  rescue StandardError => e
117
117
  raise e
@@ -116,7 +116,7 @@ module PWN
116
116
  {
117
117
  sast_module: self,
118
118
  section: 'PROTECTION OF INFORMATION AT REST',
119
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-28'
119
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
120
120
  }
121
121
  end
122
122
 
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'MALICIOUS CODE PROTECTION',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-12'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-12'
110
110
  }
111
111
  rescue StandardError => e
112
112
  raise e.mesasge
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'MALICIOUS CODE PROTECTION',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'DEVELOPER SECURITY AND PRIVACY ARCHITECTURE AND DESIGN',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SA-17'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-17'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -124,7 +124,7 @@ module PWN
124
124
  {
125
125
  sast_module: self,
126
126
  section: 'PROTECTION OF INFORMATION AT REST',
127
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-28'
127
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
128
128
  }
129
129
  rescue StandardError => e
130
130
  raise e
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'MALICIOUS CODE PROTECTION',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'PROTECTION OF INFORMATION AT REST',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-28'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
115
115
  }
116
116
  end
117
117
 
@@ -113,7 +113,7 @@ module PWN
113
113
  {
114
114
  sast_module: self,
115
115
  section: 'VULNERABILITY SCANNING',
116
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=RA-5'
116
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=RA-5'
117
117
  }
118
118
  rescue StandardError => e
119
119
  raise e
data/lib/pwn/sast/port.rb CHANGED
@@ -116,7 +116,7 @@ module PWN
116
116
  {
117
117
  sast_module: self,
118
118
  section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
119
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-8'
119
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-8'
120
120
  }
121
121
  rescue StandardError => e
122
122
  raise e
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=IA-7'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=IA-7'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -111,7 +111,7 @@ module PWN
111
111
  {
112
112
  sast_module: self,
113
113
  section: 'LEAST PRIVILEGE',
114
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-6'
114
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
115
115
  }
116
116
  rescue StandardError => e
117
117
  raise e
@@ -116,7 +116,7 @@ module PWN
116
116
  {
117
117
  sast_module: self,
118
118
  section: 'PROTECTION OF INFORMATION AT REST',
119
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-28'
119
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
120
120
  }
121
121
  rescue StandardError => e
122
122
  raise e
@@ -117,7 +117,7 @@ module PWN
117
117
  {
118
118
  sast_module: self,
119
119
  section: 'DEVELOPER SECURITY AND PRIVACY ARCHITECTURE AND DESIGN',
120
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SA-17'
120
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-17'
121
121
  }
122
122
  rescue StandardError => e
123
123
  raise e
data/lib/pwn/sast/sql.rb CHANGED
@@ -113,7 +113,7 @@ module PWN
113
113
  {
114
114
  sast_module: self,
115
115
  section: 'INFORMATION INPUT VALIDATION',
116
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-10'
116
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
117
117
  }
118
118
  rescue StandardError => e
119
119
  raise e
data/lib/pwn/sast/ssl.rb CHANGED
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'PUBLIC KEY INFRASTRUCTURE CERTIFICATES',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SC-17'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-17'
110
110
  }
111
111
  rescue StandardError => e
112
112
  raise e
data/lib/pwn/sast/sudo.rb CHANGED
@@ -109,7 +109,7 @@ module PWN
109
109
  {
110
110
  sast_module: self,
111
111
  section: 'LEAST PRIVILEGE',
112
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-6'
112
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
113
113
  }
114
114
  rescue StandardError => e
115
115
  raise e
@@ -123,7 +123,7 @@ module PWN
123
123
  {
124
124
  sast_module: self,
125
125
  section: 'LEAST PRIVILEGE',
126
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=AC-6'
126
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
127
127
  }
128
128
  rescue StandardError => e
129
129
  raise e
@@ -108,7 +108,7 @@ module PWN
108
108
  {
109
109
  sast_module: self,
110
110
  section: 'ERROR HANDLING',
111
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-11'
111
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-11'
112
112
  }
113
113
  rescue StandardError => e
114
114
  raise e
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=IA-7'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=IA-7'
110
110
  }
111
111
  rescue StandardError => e
112
112
  raise e
@@ -106,7 +106,7 @@ module PWN
106
106
  {
107
107
  sast_module: self,
108
108
  section: 'VULNERABILITY SCANNING',
109
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=RA-5'
109
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=RA-5'
110
110
  }
111
111
  rescue StandardError => e
112
112
  raise e
@@ -108,7 +108,7 @@ module PWN
108
108
  {
109
109
  sast_module: self,
110
110
  section: 'MALICIOUS CODE PROTECTION',
111
- nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/control/?version=5.1&number=SI-3'
111
+ nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
112
112
  }
113
113
  rescue StandardError => e
114
114
  raise e
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.405'
4
+ VERSION = '0.4.409'
5
5
  end
@@ -21,15 +21,15 @@ end
21
21
  action = opts[:action].to_s.scrub.to_sym
22
22
 
23
23
  def start
24
- if ENV['PWN_ROOT']
25
- pwn_root = ENV['PWN_ROOT']
24
+ if ENV.fetch('PWN_ROOT')
25
+ pwn_root = ENV.fetch('PWN_ROOT')
26
26
  elsif Dir.exist?('/pwn')
27
27
  pwn_root = '/pwn'
28
28
  else
29
29
  pwn_root = Dir.pwd
30
30
  end
31
31
 
32
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
32
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
33
33
  metasploit_root = '/opt/metasploit-framework-dev'
34
34
 
35
35
  msfrpcd_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/metasploit/vagrant.yaml")
@@ -32,7 +32,7 @@
32
32
  {
33
33
  "type": "shell",
34
34
  "environment_vars": [
35
- "PWN_ROOT=/opt/pwn",
35
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
36
36
  "PWN_PROVIDER=aws"
37
37
  ],
38
38
  "scripts": [
@@ -52,7 +52,7 @@
52
52
  "pause_before": "180s",
53
53
  "type": "shell",
54
54
  "environment_vars": [
55
- "PWN_ROOT=/opt/pwn",
55
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
56
56
  "PWN_PROVIDER=aws"
57
57
  ],
58
58
  "scripts": [
@@ -71,7 +71,7 @@
71
71
  "pause_before": "180s",
72
72
  "type": "shell",
73
73
  "environment_vars": [
74
- "PWN_ROOT=/opt/pwn",
74
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
75
75
  "PWN_PROVIDER=aws"
76
76
  ],
77
77
  "scripts": [
@@ -39,7 +39,7 @@
39
39
  {
40
40
  "type": "shell",
41
41
  "environment_vars": [
42
- "PWN_ROOT=/opt/pwn",
42
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
43
43
  "PWN_PROVIDER=qemu"
44
44
  ],
45
45
  "scripts": [
@@ -75,7 +75,7 @@
75
75
  "pause_before": "180s",
76
76
  "type": "shell",
77
77
  "environment_vars": [
78
- "PWN_ROOT=/opt/pwn",
78
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
79
79
  "PWN_PROVIDER=qemu"
80
80
  ],
81
81
  "scripts": [
@@ -43,7 +43,7 @@
43
43
  {
44
44
  "type": "shell",
45
45
  "environment_vars": [
46
- "PWN_ROOT=/opt/pwn",
46
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
47
47
  "PWN_PROVIDER=virtualbox"
48
48
  ],
49
49
  "scripts": [
@@ -63,7 +63,7 @@
63
63
  "pause_before": "180s",
64
64
  "type": "shell",
65
65
  "environment_vars": [
66
- "PWN_ROOT=/opt/pwn",
66
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
67
67
  "PWN_PROVIDER=virtualbox"
68
68
  ],
69
69
  "scripts": [
@@ -83,7 +83,7 @@
83
83
  "pause_before": "180s",
84
84
  "type": "shell",
85
85
  "environment_vars": [
86
- "PWN_ROOT=/opt/pwn",
86
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
87
87
  "PWN_PROVIDER=virtualbox"
88
88
  ],
89
89
  "scripts": [
@@ -102,7 +102,7 @@
102
102
  "pause_before": "180s",
103
103
  "type": "shell",
104
104
  "environment_vars": [
105
- "PWN_ROOT=/opt/pwn",
105
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
106
106
  "PWN_PROVIDER=virtualbox"
107
107
  ],
108
108
  "scripts": [
@@ -43,7 +43,7 @@
43
43
  {
44
44
  "type": "shell",
45
45
  "environment_vars": [
46
- "PWN_ROOT=/opt/pwn",
46
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
47
47
  "PWN_PROVIDER=vmware"
48
48
  ],
49
49
  "scripts": [
@@ -63,7 +63,7 @@
63
63
  "pause_before": "180s",
64
64
  "type": "shell",
65
65
  "environment_vars": [
66
- "PWN_ROOT=/opt/pwn",
66
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
67
67
  "PWN_PROVIDER=vmware"
68
68
  ],
69
69
  "scripts": [
@@ -83,7 +83,7 @@
83
83
  "pause_before": "180s",
84
84
  "type": "shell",
85
85
  "environment_vars": [
86
- "PWN_ROOT=/opt/pwn",
86
+ "PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
87
87
  "PWN_PROVIDER=vmware"
88
88
  ],
89
89
  "scripts": [
@@ -5,15 +5,15 @@ require 'yaml'
5
5
 
6
6
  # Install Metasploit from Source
7
7
  printf 'Installing Metasploit *****************************************************************'
8
- if ENV['PWN_ROOT']
9
- pwn_root = ENV['PWN_ROOT']
8
+ if ENV.fetch('PWN_ROOT')
9
+ pwn_root = ENV.fetch('PWN_ROOT')
10
10
  elsif Dir.exist?('/pwn')
11
11
  pwn_root = '/pwn'
12
12
  else
13
13
  pwn_root = Dir.pwd
14
14
  end
15
15
 
16
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
16
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
17
17
 
18
18
  metasploit_root = '/opt/metasploit-framework-dev'
19
19
  `sudo git clone https://github.com/rapid7/metasploit-framework.git #{metasploit_root}`
@@ -10,7 +10,7 @@ else
10
10
  fi
11
11
 
12
12
  sudo tee -a $pwn_env_file << EOF
13
- export PWN_ROOT='/opt/pwn'
13
+ export PWN_ROOT=\$(ruby -r pwn -e 'puts "#{Gem.path.first}/gems/pwn-#{PWN::VERSION}"')
14
14
  export PWN_PROVIDER='${pwn_provider}'
15
15
  EOF
16
16
 
@@ -5,15 +5,15 @@ require 'yaml'
5
5
  require 'digest'
6
6
  require 'fileutils'
7
7
 
8
- if ENV['PWN_ROOT']
9
- pwn_root = ENV['PWN_ROOT']
8
+ if ENV.fetch('PWN_ROOT')
9
+ pwn_root = ENV.fetch('PWN_ROOT')
10
10
  elsif Dir.exist?('/pwn')
11
11
  pwn_root = '/pwn'
12
12
  else
13
13
  pwn_root = Dir.pwd
14
14
  end
15
15
 
16
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
16
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
17
17
  userland_config = "#{pwn_root}/etc/userland/#{pwn_provider}/burpsuite/vagrant.yaml"
18
18
  userland_burpsuite_pro_jar_path = "#{pwn_root}/third_party/burpsuite-pro.jar"
19
19
  burpsuite_pro_jar_dest_path = "/opt/burpsuite/#{File.basename(userland_burpsuite_pro_jar_path)}"
@@ -4,15 +4,15 @@
4
4
  require 'yaml'
5
5
  require 'pwn'
6
6
 
7
- if ENV['PWN_ROOT']
8
- pwn_root = ENV['PWN_ROOT']
7
+ if ENV.fetch('PWN_ROOT')
8
+ pwn_root = ENV.fetch('PWN_ROOT')
9
9
  elsif Dir.exist?('/pwn')
10
10
  pwn_root = '/pwn'
11
11
  else
12
12
  pwn_root = Dir.pwd
13
13
  end
14
14
 
15
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
15
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
16
16
  jenkins_userland_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/jenkins/vagrant.yaml")
17
17
  private_key_path = '/var/lib/jenkins/.ssh/id_rsa-pwn_jenkins'
18
18
  userland_ssh_keygen_pass = jenkins_userland_config['ssh_keygen_pass']
@@ -1,8 +1,8 @@
1
1
  #!/usr/bin/env ruby
2
2
  # frozen_string_literal: true
3
3
 
4
- if ENV['PWN_ROOT']
5
- pwn_root = ENV['PWN_ROOT']
4
+ if ENV.fetch('PWN_ROOT')
5
+ pwn_root = ENV.fetch('PWN_ROOT')
6
6
  elsif Dir.exist?('/pwn')
7
7
  pwn_root = '/pwn'
8
8
  else
@@ -4,15 +4,15 @@
4
4
  require 'yaml'
5
5
 
6
6
  print "Installing Let's Encrypt **************************************************************"
7
- if ENV['PWN_ROOT']
8
- pwn_root = ENV['PWN_ROOT']
7
+ if ENV.fetch('PWN_ROOT')
8
+ pwn_root = ENV.fetch('PWN_ROOT')
9
9
  elsif Dir.exist?('/pwn')
10
10
  pwn_root = '/pwn'
11
11
  else
12
12
  pwn_root = Dir.pwd
13
13
  end
14
14
 
15
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
15
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
16
16
  letsencrypt_git = 'https://github.com/letsencrypt/letsencrypt'
17
17
  letsencrypt_root = '/opt/letsencrypt-git'
18
18
  letsencrypt_yaml = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/letsencrypt/vagrant.yaml")
@@ -3,15 +3,15 @@
3
3
 
4
4
  require 'yaml'
5
5
 
6
- if ENV['PWN_ROOT']
7
- pwn_root = ENV['PWN_ROOT']
6
+ if ENVfetch('PWN_ROOT')
7
+ pwn_root = ENV.fetch('PWN_ROOT')
8
8
  elsif Dir.exist?('/pwn')
9
9
  pwn_root = '/pwn'
10
10
  else
11
11
  pwn_root = Dir.pwd
12
12
  end
13
13
 
14
- pwn_provider = ENV['PWN_PROVIDER'] if ENV['PWN_PROVIDER']
14
+ pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
15
15
  jenkins_userland_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/jenkins/vagrant.yaml")
16
16
  userland_user = jenkins_userland_config['user']
17
17
  userland_pass = jenkins_userland_config['pass']
@@ -10,7 +10,7 @@ else
10
10
  fi
11
11
 
12
12
  sudo tee -a $pwn_env_file << EOF
13
- export PWN_ROOT='/opt/pwn'
13
+ export PWN_ROOT=\$(ruby -r pwn -e 'puts "#{Gem.path.first}/gems/pwn-#{PWN::VERSION}"')
14
14
  export PWN_PROVIDER='${pwn_provider}'
15
15
  EOF
16
16
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.405
4
+ version: 0.4.409
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-04-11 00:00:00.000000000 Z
11
+ date: 2022-04-21 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport
@@ -100,28 +100,28 @@ dependencies:
100
100
  requirements:
101
101
  - - '='
102
102
  - !ruby/object:Gem::Version
103
- version: 4.14.1
103
+ version: 4.15.0
104
104
  type: :runtime
105
105
  prerelease: false
106
106
  version_requirements: !ruby/object:Gem::Requirement
107
107
  requirements:
108
108
  - - '='
109
109
  - !ruby/object:Gem::Version
110
- version: 4.14.1
110
+ version: 4.15.0
111
111
  - !ruby/object:Gem::Dependency
112
112
  name: bundler
113
113
  requirement: !ruby/object:Gem::Requirement
114
114
  requirements:
115
115
  - - ">="
116
116
  - !ruby/object:Gem::Version
117
- version: 2.3.11
117
+ version: 2.3.12
118
118
  type: :development
119
119
  prerelease: false
120
120
  version_requirements: !ruby/object:Gem::Requirement
121
121
  requirements:
122
122
  - - ">="
123
123
  - !ruby/object:Gem::Version
124
- version: 2.3.11
124
+ version: 2.3.12
125
125
  - !ruby/object:Gem::Dependency
126
126
  name: bundler-audit
127
127
  requirement: !ruby/object:Gem::Requirement
@@ -660,14 +660,14 @@ dependencies:
660
660
  requirements:
661
661
  - - '='
662
662
  - !ruby/object:Gem::Version
663
- version: 1.27.0
663
+ version: 1.28.1
664
664
  type: :runtime
665
665
  prerelease: false
666
666
  version_requirements: !ruby/object:Gem::Requirement
667
667
  requirements:
668
668
  - - '='
669
669
  - !ruby/object:Gem::Version
670
- version: 1.27.0
670
+ version: 1.28.1
671
671
  - !ruby/object:Gem::Dependency
672
672
  name: rubocop-rake
673
673
  requirement: !ruby/object:Gem::Requirement
@@ -688,14 +688,14 @@ dependencies:
688
688
  requirements:
689
689
  - - '='
690
690
  - !ruby/object:Gem::Version
691
- version: 2.9.0
691
+ version: 2.10.0
692
692
  type: :runtime
693
693
  prerelease: false
694
694
  version_requirements: !ruby/object:Gem::Requirement
695
695
  requirements:
696
696
  - - '='
697
697
  - !ruby/object:Gem::Version
698
- version: 2.9.0
698
+ version: 2.10.0
699
699
  - !ruby/object:Gem::Dependency
700
700
  name: ruby-audio
701
701
  requirement: !ruby/object:Gem::Requirement
@@ -1943,14 +1943,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
1943
1943
  requirements:
1944
1944
  - - ">="
1945
1945
  - !ruby/object:Gem::Version
1946
- version: 3.1.1
1946
+ version: 3.1.2
1947
1947
  required_rubygems_version: !ruby/object:Gem::Requirement
1948
1948
  requirements:
1949
1949
  - - ">="
1950
1950
  - !ruby/object:Gem::Version
1951
1951
  version: '0'
1952
1952
  requirements: []
1953
- rubygems_version: 3.3.11
1953
+ rubygems_version: 3.3.12
1954
1954
  signing_key:
1955
1955
  specification_version: 4
1956
1956
  summary: Automated Security Testing for CI/CD Pipelines & Beyond