@aegis-scan/skills 0.4.0 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (386) hide show
  1. package/ATTRIBUTION.md +204 -0
  2. package/CHANGELOG.md +48 -3
  3. package/package.json +1 -1
  4. package/sbom.cdx.json +1 -1
  5. package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
  6. package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
  7. package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
  8. package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
  9. package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
  10. package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
  11. package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
  12. package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
  13. package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
  14. package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
  15. package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
  16. package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
  17. package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
  18. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
  19. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
  20. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
  21. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
  22. package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
  23. package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
  24. package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
  25. package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
  26. package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
  27. package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
  28. package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
  29. package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
  30. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
  31. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
  32. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
  33. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
  34. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
  35. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
  36. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
  37. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
  38. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
  39. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
  40. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
  41. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
  42. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
  43. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
  44. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
  45. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
  46. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
  47. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
  48. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
  49. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
  50. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
  51. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
  52. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
  53. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
  54. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
  55. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
  56. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
  57. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
  58. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
  59. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
  60. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
  61. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
  62. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
  63. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
  64. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
  65. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
  66. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
  67. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
  68. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
  69. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
  70. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
  71. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
  72. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
  73. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
  74. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
  75. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
  76. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
  77. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
  78. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
  79. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
  80. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
  81. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
  82. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
  83. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
  84. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
  85. package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
  86. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
  87. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
  88. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
  89. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
  90. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
  91. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
  92. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
  93. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
  94. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
  95. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
  96. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
  97. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
  98. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
  99. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
  100. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
  101. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
  102. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
  103. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
  104. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
  105. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
  106. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
  107. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
  108. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
  109. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
  110. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
  111. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
  112. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
  113. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
  114. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
  115. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
  116. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
  117. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
  118. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
  119. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
  120. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
  121. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
  122. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
  123. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
  124. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
  125. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
  126. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
  127. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
  128. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
  129. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
  130. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
  131. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
  132. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
  133. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
  134. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
  135. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
  136. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
  137. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
  138. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
  139. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
  140. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
  141. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
  142. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
  143. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
  144. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
  145. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
  146. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
  147. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
  148. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
  149. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
  150. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
  151. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
  152. package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
  153. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
  154. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
  155. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
  156. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
  157. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
  158. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
  159. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
  160. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
  161. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
  162. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
  163. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
  164. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
  165. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
  166. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
  167. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
  168. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
  169. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
  170. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
  171. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
  172. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
  173. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
  174. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
  175. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
  176. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
  177. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
  178. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
  179. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
  180. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
  181. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
  182. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
  183. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
  184. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
  185. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
  186. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
  187. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
  188. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
  189. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
  190. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
  191. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
  192. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
  193. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
  194. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
  195. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
  196. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
  197. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
  198. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
  199. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
  200. package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
  201. package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
  202. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
  203. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
  204. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
  205. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
  206. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
  207. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
  208. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
  209. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
  210. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
  211. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
  212. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
  213. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
  214. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
  215. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
  216. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
  217. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
  218. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
  219. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
  220. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
  221. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
  222. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
  223. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
  224. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
  225. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
  226. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
  227. package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
  228. package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
  229. package/skills/defensive/permoon-fork/README.md +40 -0
  230. package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
  231. package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
  232. package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
  233. package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
  234. package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
  235. package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
  236. package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
  237. package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
  238. package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
  239. package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
  240. package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
  241. package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
  242. package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
  243. package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
  244. package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
  245. package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
  246. package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
  247. package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
  248. package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
  249. package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
  250. package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
  251. package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
  252. package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
  253. package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
  254. package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
  255. package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
  256. package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
  257. package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
  258. package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
  259. package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
  260. package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
  261. package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
  262. package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
  263. package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
  264. package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
  265. package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
  266. package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
  267. package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
  268. package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
  269. package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
  270. package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
  271. package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
  272. package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
  273. package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
  274. package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
  275. package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
  276. package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
  277. package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
  278. package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
  279. package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
  280. package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
  281. package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
  282. package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
  283. package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
  284. package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
  285. package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
  286. package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
  287. package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
  288. package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
  289. package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
  290. package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
  291. package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
  292. package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
  293. package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
  294. package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
  295. package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
  296. package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
  297. package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
  298. package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
  299. package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
  300. package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
  301. package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
  302. package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
  303. package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
  304. package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
  305. package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
  306. package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
  307. package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
  308. package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
  309. package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
  310. package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
  311. package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
  312. package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
  313. package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
  314. package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
  315. package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
  316. package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
  317. package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
  318. package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
  319. package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
  320. package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
  321. package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
  322. package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
  323. package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
  324. package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
  325. package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
  326. package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
  327. package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
  328. package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
  329. package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
  330. package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
  331. package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
  332. package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
  333. package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
  334. package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
  335. package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
  336. package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
  337. package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
  338. package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
  339. package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
  340. package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
  341. package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
  342. package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
  343. package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
  344. package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
  345. package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
  346. package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
  347. package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
  348. package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
  349. package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
  350. package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
  351. package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
  352. package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
  353. package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
  354. package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
  355. package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
  356. package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
  357. package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
  358. package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
  359. package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
  360. package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
  361. package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
  362. package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
  363. package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
  364. package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
  365. package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
  366. package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
  367. package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
  368. package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
  369. package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
  370. package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
  371. package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
  372. package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
  373. package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
  374. package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
  375. package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
  376. package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
  377. package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
  378. package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
  379. package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
  380. package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
  381. package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
  382. package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
  383. package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
  384. package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
  385. package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
  386. package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
@@ -0,0 +1,435 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ # CTF Challenge Methodology — Thinking + Execution Framework
4
+
5
+ How to approach Capture The Flag challenges. This covers both methodology AND execution
6
+ discipline to prevent common mistakes.
7
+
8
+ ---
9
+
10
+ ## Understanding CTF
11
+
12
+ CTF challenges are designed puzzles where every element is intentional. Unlike bug bounty,
13
+ there are no false positives — if something looks strange, it IS the vulnerability.
14
+ The challenge author placed every component deliberately.
15
+
16
+ ### CTF Categories
17
+
18
+ CTF is broad. The challenge type determines your approach:
19
+
20
+ - **Web** — Vulnerable web applications (the most common in pentest-style CTFs)
21
+ - **Crypto** — Cryptographic weaknesses, cipher breaking, key recovery
22
+ - **Forensics** — Analyzing files, memory dumps, packet captures, steganography
23
+ - **Pwn/Binary** — Buffer overflows, format strings, ROP chains, heap exploitation
24
+ - **Reverse Engineering** — Analyzing compiled binaries to understand hidden logic
25
+ - **Misc** — Anything goes: OSINT, scripting, puzzles, unconventional challenges
26
+
27
+ This skill focuses on **web CTF** since AIRecon's tools are web-focused, but the thinking
28
+ principles apply to all categories.
29
+
30
+ ---
31
+
32
+ ## CRITICAL: Execution Discipline
33
+
34
+ These rules prevent the most common failure modes. Follow them STRICTLY.
35
+
36
+ ### Rule 1: Maintain Session State Across ALL Requests
37
+
38
+ Web applications use cookies to track sessions. If you don't persist cookies, the
39
+ application forgets who you are and every request starts from zero.
40
+
41
+ **EVERY curl command MUST include both `-c` and `-b` with the same cookie file in the output directory:**
42
+ - `-c output/cookies.txt` saves cookies from the response
43
+ - `-b output/cookies.txt` sends saved cookies with the request
44
+ - Use BOTH on EVERY request, not just the first one
45
+
46
+ If you see a 302 redirect back to a login page, it means your session was lost because
47
+ you forgot to send cookies.
48
+
49
+ ### Rule 2: Never Repeat the Same Request
50
+
51
+ If you already fetched a URL and read its content, DO NOT fetch it again.
52
+ You already have the information. Use it.
53
+
54
+ If you need to reference earlier data, recall it from your conversation context.
55
+ The data is already in your memory from the previous tool output.
56
+
57
+ ### Rule 3: Understand Exit Codes
58
+
59
+ When using `grep` or similar filtering commands:
60
+ - **Exit code 0** = matches were found (success)
61
+ - **Exit code 1** = NO matches were found (this is NOT an error — it means the pattern
62
+ simply wasn't present in the data)
63
+ - **Exit code 2+** = actual error (syntax problem, file not found, etc.)
64
+
65
+ When the execute tool reports "ERROR: Command failed (exit code: 1)" after a grep,
66
+ it means the pattern was NOT found. This is useful information — the flag is not in
67
+ that response. Move to the next endpoint.
68
+
69
+ ### Rule 4: Use the Correct Workspace Paths
70
+
71
+ Your workspace follows a strict structure based on the target:
72
+ ```
73
+ /workspace/<target>/
74
+ command/ ← command execution logs (auto-saved)
75
+ output/ ← YOUR output files go here
76
+ tools/ ← custom scripts you create
77
+ vulnerabilities/ ← vulnerability reports (auto-saved)
78
+ ```
79
+
80
+ For example, if the target is `localhost:8080`:
81
+ - Save curl output to: `/workspace/localhost:8080/output/main_page.html`
82
+ - Save scripts to: `/workspace/localhost:8080/tools/exploit.py`
83
+
84
+ **Never use** `/workspace/output/` (missing target) or `output/` (relative).
85
+
86
+ ### Rule 5: Don't Use read_file for Files You Haven't Saved
87
+
88
+ The `read_file` tool reads files from the workspace. If you haven't explicitly saved
89
+ a curl response to a file, the file doesn't exist. Either:
90
+ - Save it: `curl -s URL > output/filename.html`
91
+ - Or just read the curl output directly — it's already in your conversation context
92
+
93
+ ### Rule 6: Handle Redirects With Session
94
+
95
+ A 302 redirect after login means the login succeeded and the app wants to redirect you.
96
+ But a redirect changes POST to GET and may drop cookies. To handle multi-step flows:
97
+
98
+ 1. Make each request separately (don't use `-L` for POST requests)
99
+ 2. Read the `Location` header from the response
100
+ 3. Make a NEW GET request to that location, with cookies
101
+
102
+ ### Rule 7: Read the Full Response Before Acting
103
+
104
+ Don't pipe curl through `head -100` or `grep` on the first request. Read the ENTIRE
105
+ response first. After you understand the full page, use grep for specific searches.
106
+
107
+ ### Rule 8: Track Your Discoveries
108
+
109
+ As you test, keep a mental inventory of what you've found:
110
+ - **Credentials discovered**: (from comments, config files, error messages)
111
+ - **Endpoints discovered**: (from HTML links, JavaScript, form actions)
112
+ - **Hidden fields discovered**: (from form analysis)
113
+ - **Session state**: (are you logged in? which user?)
114
+
115
+ Every new piece of information should inform your next action.
116
+
117
+ ---
118
+
119
+ ## Core Principle: Read Before You Act
120
+
121
+ The single most important skill in CTF is **reading carefully**.
122
+
123
+ ### Read HTML Completely
124
+
125
+ Every line matters. The flag or the path to it is hidden in the response:
126
+ - Comments that developers "forgot" to remove
127
+ - Hidden form fields that reveal internal structure
128
+ - JavaScript code that shows how the application ACTUALLY works
129
+ - Error messages that leak implementation details
130
+ - HTTP headers that reveal the technology stack
131
+
132
+ ### Read JavaScript Completely
133
+
134
+ JavaScript is the map of the application. It shows you:
135
+ - Every API endpoint the frontend communicates with
136
+ - The exact URL patterns and parameter names
137
+ - How data flows between pages
138
+ - Authentication and authorization logic on the client side
139
+ - AJAX calls that reveal backend routes invisible in the HTML
140
+
141
+ **IMPORTANT:** JavaScript is often at the BOTTOM of the HTML page. If you only read the
142
+ first part of a response, you miss the most critical information.
143
+
144
+ ### Read Error Messages
145
+
146
+ Errors are not failures — they are information:
147
+ - A 400 Bad Request tells you what the server EXPECTED
148
+ - A 404 tells you the URL pattern is wrong — re-examine the source
149
+ - A 405 tells you the HTTP method is wrong
150
+ - A 500 may leak stack traces, file paths, database queries
151
+ - A 302 redirect tells you WHERE the application wants you to go
152
+
153
+ ---
154
+
155
+ ## Methodology: Observe → Hypothesize → Test → Adapt
156
+
157
+ ### Step 1: Observe
158
+
159
+ Fetch the application and absorb EVERYTHING. Don't rush to test.
160
+ - What does this application do? What is its purpose?
161
+ - What technology is it built with?
162
+ - What are all the routes, forms, and interactive elements?
163
+ - What does the JavaScript reveal about the backend?
164
+ - Are there HTML comments, hidden fields, or debug information?
165
+ - What does the HTTP response header tell you about the server?
166
+
167
+ ### Step 2: Hypothesize
168
+
169
+ Based on your observations, form theories about where the vulnerability is:
170
+ - "This form has a multi-step flow — maybe the second step has weaker validation"
171
+ - "These numeric IDs in the URL suggest predictable identifiers"
172
+ - "This search parameter reflects input back — possible injection point"
173
+ - "The JavaScript reveals an endpoint not linked in the UI"
174
+ - "This hidden field contains a user ID — maybe I can change it"
175
+
176
+ ### Step 3: Test
177
+
178
+ Test ONE hypothesis at a time. Use the right tool for the job:
179
+ - **curl / execute**: When you need to see raw HTTP responses, control exact headers,
180
+ manage cookies manually, or chain multiple requests
181
+ - **browser_action**: When you need to interact with JavaScript-heavy applications,
182
+ see rendered pages, click buttons, fill forms interactively
183
+ - **Caido proxy**: When you need to intercept and modify requests in-flight, replay
184
+ requests with modifications, or analyze traffic patterns
185
+
186
+ ### Step 4: Adapt
187
+
188
+ If your test fails, DON'T repeat it. Adapt:
189
+ - Analyze WHY it failed — what did the error tell you?
190
+ - Go back to the response and read it again more carefully
191
+ - Form a NEW hypothesis based on the error
192
+ - Try a different approach or a different part of the application
193
+
194
+ ---
195
+
196
+ ## Web CTF Thinking Patterns
197
+
198
+ ### Pattern: Multi-Step Authentication
199
+
200
+ Many web apps split authentication across multiple pages. Each page has its own form
201
+ with its own fields. You MUST interact with each page separately, following the
202
+ application's intended flow but looking for weaknesses at each step.
203
+
204
+ **Think about:**
205
+ - What fields does this specific form expect?
206
+ - What happens when I submit? Where does it redirect?
207
+ - Can I manipulate the redirect destination?
208
+ - Can I skip a step entirely?
209
+ - Are there hidden fields I can modify?
210
+
211
+ ### Pattern: Object References
212
+
213
+ When you see identifiers in URLs or responses (numbers, UUIDs, slugs), ask yourself:
214
+ - Who does this object belong to?
215
+ - Can I access objects that belong to other users?
216
+ - Is there a sequential pattern I can predict?
217
+ - What happens if I use an ID that shouldn't be accessible to me?
218
+
219
+ ### Pattern: Client-Side Trust
220
+
221
+ Applications often trust client-side data. Think about:
222
+ - Hidden form fields that could be editable
223
+ - Cookie values that encode user information
224
+ - Client-side validation that can be bypassed
225
+ - Prices, permissions, or roles stored in the request
226
+
227
+ ### Pattern: Information Leakage
228
+
229
+ Developers leave traces. Think about:
230
+ - HTML comments with development notes
231
+ - Backup files or configuration files accessible via URL
232
+ - Error messages that reveal code structure
233
+ - Response headers that leak technology information
234
+ - API endpoints that return more data than the UI shows
235
+
236
+ ### Pattern: Injection Points
237
+
238
+ Wherever user input enters the application, think about:
239
+ - Is this input reflected in the response?
240
+ - Is this input used in a database query?
241
+ - Is this input used in a file path?
242
+ - Is this input used in a system command?
243
+ - Is this input used in a template?
244
+
245
+ ### Pattern: Session and State
246
+
247
+ Think about how the application tracks who you are:
248
+ - How is your session maintained after login?
249
+ - Can you forge or modify session tokens?
250
+ - What happens if you perform actions without a valid session?
251
+ - Can you escalate permissions by manipulating session data?
252
+
253
+ ---
254
+
255
+ ## Tool Selection: Context Matters
256
+
257
+ There is no "best tool" — each tool has a purpose:
258
+
259
+ ### Use curl (execute) when:
260
+ - You need to see the raw, unprocessed HTTP response
261
+ - You want full control over headers, cookies, and request body
262
+ - You're testing specific parameter values
263
+ - You need to chain multiple requests with shared cookies
264
+ - You want to automate testing with loops or scripts
265
+
266
+ ### Use browser_action when:
267
+ - The application relies heavily on JavaScript for rendering
268
+ - You need to interact with dynamic elements (dropdowns, modals, AJAX)
269
+ - You need to fill forms that have client-side validation
270
+ - You want to see what a real user sees
271
+ - JavaScript execution is required to trigger certain behaviors
272
+
273
+ ### Use Caido when:
274
+ - You want to intercept and modify requests between browser and server
275
+ - You need to replay a captured request with slight modifications
276
+ - You want to analyze the full traffic flow of a complex interaction
277
+ - You're testing race conditions or need precise request timing
278
+ - You need to compare responses across multiple modified requests
279
+
280
+ ### Write custom scripts (execute with Python) when:
281
+ - You need to automate a specific testing pattern
282
+ - The vulnerability requires complex multi-step exploitation
283
+ - You need to brute-force a specific parameter space
284
+ - You want to parse and analyze large responses programmatically
285
+
286
+ ---
287
+
288
+ ## Common Mistakes in CTF
289
+
290
+ 1. **Not reading the full response** — The answer is in the data you already received
291
+ 2. **Repeating the same request** — If it failed, change your approach
292
+ 3. **Guessing URL patterns** — Read the JavaScript to find exact endpoints
293
+ 4. **Sending extra form fields** — Only send what the form expects
294
+ 5. **Using the wrong HTTP method** — Check the form's method attribute
295
+ 6. **Ignoring redirects** — Follow them to see where the app takes you
296
+ 7. **Not managing cookies** — Authentication requires session persistence
297
+ 8. **Running recon scanners** — CTF is a focused puzzle, not a wide-net hunt
298
+ 9. **Over-automating** — Sometimes manually reading a response reveals the flag
299
+ 10. **Not thinking about the challenge author's intent** — Ask "what did they WANT me to find?"
300
+
301
+ ---
302
+
303
+ ## Flag Detection Pattern
304
+
305
+ The flag is the proof that you solved the challenge. You must actively look for it
306
+ in EVERY response you receive.
307
+
308
+ ### Flag Formats
309
+
310
+ Flags follow recognizable patterns, but the format varies by CTF:
311
+ - `FLAG{...}` — the most common format
312
+ - `flag{...}` — lowercase variant
313
+ - `CTF{...}` — competition-specific prefix
314
+ - Custom formats: `XBOW{...}`, `HTB{...}`, `picoCTF{...}`, etc.
315
+ - Sometimes the flag is a plain string described in the challenge instructions
316
+
317
+ **IMPORTANT:** Always check the challenge description for the expected flag format.
318
+ If the challenge says "the flag is in format FLAG{...}", that's what you search for.
319
+
320
+ ### Where Flags Appear
321
+
322
+ Flags can be embedded ANYWHERE in the application's responses. Develop the habit of
323
+ scanning every response you receive:
324
+
325
+ - **In the HTTP response body** — embedded in HTML, JSON, or plain text
326
+ - **In HTTP response headers** — custom headers like `X-Flag:` or `X-Secret:`
327
+ - **In HTML comments** — `<!-- FLAG{...} -->`
328
+ - **In database records** — accessible through data access vulnerabilities
329
+ - **In files on the server** — accessible through file access vulnerabilities
330
+ - **In error messages** — verbose errors may include flag data
331
+ - **In cookies or tokens** — decoded JWT payloads, base64-encoded cookie values
332
+ - **In JavaScript variables** — hardcoded in client-side code
333
+ - **In API responses** — JSON fields you don't see in the UI
334
+
335
+ ### Detection Approach
336
+
337
+ After EVERY significant interaction with the application:
338
+ 1. Scan the full response for the expected flag pattern
339
+ 2. Check if any new data was revealed that you haven't seen before
340
+ 3. Look for base64-encoded strings and decode them — they may contain the flag
341
+ 4. If you retrieve structured data (JSON, database rows), examine EVERY field
342
+
343
+ ### When You Find the Flag
344
+
345
+ The moment you see a string matching the expected flag pattern:
346
+ 1. Confirm it matches the expected format exactly
347
+ 2. Report it immediately — don't continue testing
348
+
349
+ ---
350
+
351
+ ## CTF Reporting
352
+
353
+ CTF reports must be detailed and professional. Finding the flag is only half the work —
354
+ documenting the vulnerability, exploitation path, and evidence is equally important.
355
+
356
+ ### When to Report
357
+
358
+ Call `create_vulnerability_report` immediately when you find the flag.
359
+ Do NOT continue testing after finding the flag.
360
+
361
+ ### Report Quality Standard
362
+
363
+ Every field should demonstrate clear, evidence-based analysis. The report should read
364
+ like a professional penetration test finding.
365
+
366
+ ### How to Fill Each Field
367
+
368
+ **title**: Specific vulnerability name with affected endpoint.
369
+ Describe WHAT vulnerability and WHERE it was found. Be precise.
370
+
371
+ **description**: Executive summary covering:
372
+ - What vulnerability was found
373
+ - How it was exploited
374
+ - What data was exposed
375
+ - The flag that was extracted
376
+ Write this as a clear paragraph explaining the full finding.
377
+
378
+ **target**: The full target URL (e.g., `http://localhost:8080`)
379
+
380
+ **impact**: What an attacker could do with this vulnerability:
381
+ - What data is exposed
382
+ - How many records or users are affected
383
+ - Business consequences
384
+
385
+ **technical_analysis**: Root cause analysis:
386
+ - WHY the vulnerability exists (what check or control is missing)
387
+ - What the expected secure behavior should be vs actual behavior
388
+ - How the authentication/session mechanism works (if relevant)
389
+
390
+ **poc_description**: Step-by-step exploitation walkthrough with HTTP evidence:
391
+ 1. Initial interaction — show the first request and what was discovered
392
+ 2. Exploitation — show the exact request that exploits the vulnerability
393
+ 3. Flag extraction — show the exact response containing the flag
394
+ Include actual HTTP status codes for every step.
395
+
396
+ **poc_script_code**: A complete, automated exploitation script that reproduces the
397
+ finding end-to-end. Should be executable Python or a series of curl commands.
398
+ The script must:
399
+ - Handle authentication if needed
400
+ - Perform the exact exploit steps
401
+ - Search for and extract the flag
402
+ - Print the flag when found
403
+
404
+ **remediation_steps**: Concrete fix recommendations:
405
+ - Code-level fix (authorization check before returning data)
406
+ - Architecture-level fix (use opaque IDs, implement RBAC)
407
+ - Detection (access logging, rate limiting)
408
+
409
+ **flag**: The exact flag string: `FLAG{...}`
410
+
411
+ ### Optional but Recommended
412
+
413
+ - **attack_vector** through **availability** (CVSS): Include if you can assess it accurately
414
+ - **endpoint**: The specific vulnerable endpoint
415
+ - **method**: The HTTP method used
416
+ - **suggested_fix**: A code snippet showing the fix
417
+
418
+ ### Reporting Mindset
419
+
420
+ Think of the report as something that would be submitted to a client. Even though it's
421
+ a CTF, the quality should match professional penetration testing standards:
422
+ - Evidence-based (show actual HTTP requests and responses)
423
+ - Technically detailed (explain the root cause, not just the symptoms)
424
+ - Actionable (tell the developer exactly how to fix it)
425
+ - Complete (someone else should be able to reproduce this from your report alone)
426
+
427
+ ---
428
+
429
+ ## Summary
430
+
431
+ CTF is problem-solving, not tool-running. **Read carefully, think deeply, test precisely.**
432
+ Every element in a CTF is there for a reason. The flag is always reachable through the
433
+ vulnerability the author intended. Your job is to understand the application deeply enough
434
+ to find that path. Maintain session state, track your discoveries, and never repeat yourself.
435
+ When you find the flag, report it with the same quality as a professional pentest finding.
@@ -0,0 +1,182 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: dorking
5
+ description: Google dorking and OSINT search techniques for passive reconnaissance — find exposed panels, leaked credentials, sensitive files, and attack surface using web_search without API keys
6
+ ---
7
+
8
+ # Dorking & OSINT Reconnaissance
9
+
10
+ Dorking = leveraging search engine operators to find exposed systems, sensitive files, credentials, and configuration information without touching the target directly.
11
+
12
+ **Tool to use**: `web_search` (SearXNG backend — supports full Google dork operators, no API key required)
13
+ **Results**: auto-saved to `output/dork_results.txt`
14
+
15
+ > NOTE: Shodan, Censys, FOFA require API keys not available here. Use Google dork equivalents via `web_search` instead.
16
+
17
+ ---
18
+
19
+ ## Google Dork Operators
20
+
21
+ site:target.com # Restrict to domain
22
+ inurl:admin site:target.com # URL contains "admin"
23
+ intitle:"index of" site:target.com # Page title contains text
24
+ filetype:pdf site:target.com # File extension filter
25
+ intext:"password" site:target.com # Body text contains
26
+ ext:env site:target.com # File extension (same as filetype)
27
+
28
+ ---
29
+
30
+ ## High-Value Google Dorks
31
+
32
+ ### Exposed Admin Panels
33
+
34
+ site:target.com inurl:admin
35
+ site:target.com inurl:login
36
+ site:target.com inurl:dashboard
37
+ site:target.com inurl:"/wp-admin/" # WordPress admin
38
+ site:target.com inurl:"/administrator/" # Joomla admin
39
+ site:target.com inurl:"/phpmyadmin/"
40
+ site:target.com inurl:"/manager/html" # Tomcat manager
41
+ site:target.com inurl:"/jenkins/"
42
+ site:target.com inurl:"/kibana/"
43
+ site:target.com inurl:"/grafana/"
44
+
45
+ ### Sensitive Files
46
+
47
+ site:target.com filetype:env
48
+ site:target.com filetype:log
49
+ site:target.com filetype:sql
50
+ site:target.com filetype:bak
51
+ site:target.com filetype:conf
52
+ site:target.com filetype:xml inurl:config
53
+ site:target.com ext:php.bak
54
+ site:target.com ext:old
55
+ site:target.com ext:txt inurl:password
56
+
57
+ ### Exposed Credentials / Secrets
58
+
59
+ site:target.com intext:"DB_PASSWORD"
60
+ site:target.com intext:"api_key"
61
+ site:target.com intext:"BEGIN RSA PRIVATE KEY"
62
+ site:target.com intext:"AWS_SECRET_ACCESS_KEY"
63
+ site:target.com filetype:env intext:"SECRET_KEY"
64
+
65
+ ### Directory Listing
66
+
67
+ site:target.com intitle:"index of"
68
+ site:target.com intitle:"index of /" inurl:backup
69
+ site:target.com intitle:"index of" intext:".sql"
70
+ site:target.com intitle:"index of" intext:"id_rsa"
71
+
72
+ ### Vulnerable Parameters
73
+
74
+ site:target.com inurl:".php?id=" # Potential SQLi
75
+ site:target.com inurl:"?redirect=" # Open redirect
76
+ site:target.com inurl:"?file=" # LFI potential
77
+ site:target.com inurl:"?page="
78
+ site:target.com inurl:"/cgi-bin/"
79
+ site:target.com inurl:"upload.php"
80
+
81
+ ### Git Exposure
82
+
83
+ site:target.com inurl:"/.git/config"
84
+ site:target.com intitle:"index of /.git"
85
+
86
+ ### Error Messages
87
+
88
+ site:target.com intext:"Warning: mysql_"
89
+ site:target.com intext:"PHP Warning"
90
+ site:target.com intext:"Error in your SQL syntax"
91
+ site:target.com intext:"Traceback (most recent call last)"
92
+
93
+ ---
94
+
95
+ ## GitHub / Code Repository Dorking
96
+
97
+ Search GitHub for secrets related to target — no API key needed:
98
+
99
+ site:github.com "target.com" "api_key"
100
+ site:github.com "target.com" password
101
+ site:github.com "target.com" "DB_PASSWORD"
102
+ site:github.com "target.com" "BEGIN RSA PRIVATE KEY"
103
+ site:github.com "target.com" "SECRET_KEY"
104
+ site:github.com "@target.com" password
105
+ site:github.com org:target-org ".env"
106
+
107
+ ---
108
+
109
+ ## Certificate Transparency (Subdomain Discovery)
110
+
111
+ Find ALL subdomains including internal/staging via TLS cert logs:
112
+
113
+ # Search crt.sh for subdomains:
114
+ web_search("site:crt.sh %.target.com")
115
+ web_search("crt.sh target.com subdomains")
116
+
117
+ # Direct URL to browse manually:
118
+ # https://crt.sh/?q=%.target.com
119
+
120
+ ---
121
+
122
+ ## Passive Subdomain Enumeration via Dorking
123
+
124
+ site:target.com -www # Exclude www, find subdomains
125
+ site:*.target.com # Wildcard subdomain search
126
+ web_search("site:dnsdumpster.com target.com")
127
+
128
+ ---
129
+
130
+ ## Pastebin / Paste Sites
131
+
132
+ site:pastebin.com target.com
133
+ site:pastebin.com "target.com" password
134
+ site:paste.ee target.com
135
+
136
+ ---
137
+
138
+ ## Using web_search for Dorking
139
+
140
+ All dorks run via AIRecon's `web_search` tool — no API key needed:
141
+
142
+ # Pattern: web_search("<dork query>")
143
+
144
+ web_search("site:target.com filetype:env")
145
+ web_search("site:target.com inurl:admin intitle:login")
146
+ web_search("site:target.com intext:\"DB_PASSWORD\"")
147
+ web_search("site:target.com intitle:\"index of\" intext:.sql")
148
+ web_search("site:github.com \"target.com\" api_key")
149
+ web_search("site:crt.sh %.target.com")
150
+
151
+ # Results are auto-saved to output/dork_results.txt
152
+
153
+ ---
154
+
155
+ ## Shodan / Censys / FOFA
156
+
157
+ > These tools require API keys. If the user provides an API key, use it via web_search:
158
+ > - `web_search("shodan target.com port:6379")` → redirects to Shodan results page
159
+ > - Without API key: use Google dork equivalents above instead
160
+
161
+ ---
162
+
163
+ ## Pro Tips
164
+
165
+ 1. Start with `site:target.com` — discover ALL indexed pages and unexpected subdomains
166
+ 2. `filetype:env` + `filetype:log` + `filetype:sql` = highest-value dorks for credential exposure
167
+ 3. `intitle:"index of"` reveals backup files, SQL dumps, key files
168
+ 4. GitHub dorking finds internal tools and hardcoded secrets deleted from main but still searchable
169
+ 5. Certificate transparency (`crt.sh`) finds ALL subdomains including internal/staging
170
+ 6. Run all dorks in sequence — results accumulate in `output/dork_results.txt`
171
+
172
+ ## Summary
173
+
174
+ Dorking strategy (zero API key required):
175
+ 1. `site:target.com` → map all indexed pages and subdomains
176
+ 2. `filetype:env|log|sql|bak` → find sensitive files
177
+ 3. `inurl:admin|login|api` → identify attack surfaces
178
+ 4. `intext:"DB_PASSWORD|api_key|SECRET"` → find leaked credentials
179
+ 5. `site:github.com "target.com"` → GitHub secret search
180
+ 6. `site:crt.sh %.target.com` → full subdomain list from cert transparency
181
+
182
+ All results via `web_search()` — auto-saved to `output/dork_results.txt`.