@aegis-scan/skills 0.5.0 → 0.5.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (345) hide show
  1. package/ATTRIBUTION.md +93 -0
  2. package/package.json +1 -1
  3. package/sbom.cdx.json +1 -0
  4. package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
  5. package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +878 -0
  6. package/skills/compliance/aegis-native/brutaler-anwalt/README.md +9 -3
  7. package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +93 -14
  8. package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
  9. package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
  10. package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
  11. package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
  12. package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
  13. package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
  14. package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
  15. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
  16. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
  17. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
  18. package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
  19. package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
  20. package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
  21. package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +60 -5
  22. package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +745 -11
  23. package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
  24. package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +106 -30
  25. package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +247 -2
  26. package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +75 -2
  27. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
  28. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
  29. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
  30. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
  31. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
  32. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
  33. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
  34. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
  35. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
  36. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
  37. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
  38. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
  39. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
  40. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
  41. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
  42. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
  43. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
  44. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
  45. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
  46. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
  47. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
  48. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
  49. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
  50. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
  51. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
  52. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
  53. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
  54. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
  55. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
  56. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
  57. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
  58. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
  59. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
  60. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
  61. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
  62. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
  63. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
  64. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
  65. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
  66. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
  67. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
  68. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
  69. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
  70. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
  71. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
  72. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
  73. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
  74. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
  75. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
  76. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
  77. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
  78. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
  79. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
  80. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
  81. package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
  82. package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +55 -8
  83. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
  84. package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
  85. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
  86. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
  87. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
  88. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
  89. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
  90. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +4 -1
  91. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
  92. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
  93. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
  94. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
  95. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
  96. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
  97. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
  98. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
  99. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
  100. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
  101. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
  102. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
  103. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
  104. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
  105. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +3 -0
  106. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
  107. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
  108. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
  109. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
  110. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
  111. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
  112. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
  113. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
  114. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
  115. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
  116. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
  117. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
  118. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
  119. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
  120. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
  121. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
  122. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
  123. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
  124. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
  125. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
  126. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
  127. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
  128. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
  129. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
  130. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
  131. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
  132. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
  133. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +3 -2
  134. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
  135. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
  136. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +71 -3
  137. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
  138. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
  139. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
  140. package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
  141. package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +115 -9
  142. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +1 -1
  143. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
  144. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
  145. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
  146. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
  147. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
  148. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
  149. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
  150. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
  151. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
  152. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
  153. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
  154. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
  155. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
  156. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
  157. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
  158. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
  159. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
  160. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
  161. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
  162. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
  163. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
  164. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
  165. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
  166. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
  167. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
  168. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
  169. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
  170. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
  171. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
  172. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
  173. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
  174. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
  175. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
  176. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
  177. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
  178. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
  179. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
  180. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
  181. package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
  182. package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
  183. package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
  184. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +80 -0
  185. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
  186. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
  187. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
  188. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
  189. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
  190. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
  191. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
  192. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
  193. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
  194. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
  195. package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
  196. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +190 -48
  197. package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
  198. package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
  199. package/skills/defensive/permoon-fork/README.md +40 -0
  200. package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
  201. package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
  202. package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
  203. package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
  204. package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +1 -1
  205. package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
  206. package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
  207. package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
  208. package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
  209. package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
  210. package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
  211. package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
  212. package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
  213. package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
  214. package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
  215. package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
  216. package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
  217. package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
  218. package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
  219. package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
  220. package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
  221. package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
  222. package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
  223. package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
  224. package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
  225. package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
  226. package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
  227. package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
  228. package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
  229. package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
  230. package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
  231. package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
  232. package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
  233. package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
  234. package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
  235. package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
  236. package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
  237. package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
  238. package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
  239. package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
  240. package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
  241. package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
  242. package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
  243. package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
  244. package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
  245. package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
  246. package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
  247. package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
  248. package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
  249. package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
  250. package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
  251. package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
  252. package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
  253. package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
  254. package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
  255. package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
  256. package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
  257. package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
  258. package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
  259. package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
  260. package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
  261. package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
  262. package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
  263. package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
  264. package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
  265. package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
  266. package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
  267. package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
  268. package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
  269. package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
  270. package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
  271. package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
  272. package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
  273. package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
  274. package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
  275. package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
  276. package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
  277. package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
  278. package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
  279. package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
  280. package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
  281. package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
  282. package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
  283. package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
  284. package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
  285. package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
  286. package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
  287. package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
  288. package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
  289. package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
  290. package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
  291. package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
  292. package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
  293. package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
  294. package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
  295. package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
  296. package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
  297. package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
  298. package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
  299. package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
  300. package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
  301. package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
  302. package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
  303. package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
  304. package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
  305. package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
  306. package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
  307. package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
  308. package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
  309. package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
  310. package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
  311. package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
  312. package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
  313. package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
  314. package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
  315. package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
  316. package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
  317. package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
  318. package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
  319. package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
  320. package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
  321. package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
  322. package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
  323. package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
  324. package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
  325. package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
  326. package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
  327. package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
  328. package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
  329. package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
  330. package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
  331. package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
  332. package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
  333. package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
  334. package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
  335. package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
  336. package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
  337. package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
  338. package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
  339. package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
  340. package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
  341. package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
  342. package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
  343. package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
  344. package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
  345. package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
@@ -0,0 +1,305 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ # Full Recon Standard Operating Procedure
4
+
5
+ This document is for [FULL RECON] engagements ONLY.
6
+ For [SPECIFIC TASK] requests, do NOT follow this SOP — execute only what was asked.
7
+
8
+ ---
9
+
10
+ ## Workspace Structure
11
+
12
+ You execute commands inside the Docker Sandbox. CWD is already the target workspace root.
13
+
14
+ REQUIRED STRUCTURE (AUTO-CREATED — do NOT run mkdir manually):
15
+
16
+ output/ — MANDATORY for all tool outputs
17
+ command/ — system-managed logs. READ ONLY.
18
+ tools/ — MANDATORY for all custom scripts you create (e.g., Python/Bash).
19
+ vulnerabilities/ — ONLY write here via create_vulnerability_report tool.
20
+
21
+ CRITICAL: NEVER use absolute paths starting with /workspace/. ALWAYS use relative paths.
22
+ Correct tool output: output/file.txt
23
+ Correct custom script: tools/exploit.py
24
+ Wrong: /workspace/target/output/file.txt
25
+ Wrong: output/exploit.py (scripts go in tools/)
26
+
27
+ SUBDOMAIN DIRECTORY RULE: ALL outputs and vulnerabilities for subdomains (e.g. `help.target.com`) MUST be saved inside the primary target's workspace folder (e.g. `workspace/target.com/output/` or `workspace/target.com/vulnerabilities/`). NEVER create new top-level workspace folders for individual subdomains.
28
+
29
+ If a tool fails to output to the directory, move it immediately: mv raw_output.txt output/
30
+
31
+ ---
32
+
33
+ ## Engagement Rules
34
+
35
+ BROWSER MANDATE: Use browser_action on EVERY web target — NO EXCEPTIONS.
36
+ Visit the site, extract view_source, check for hidden comments, API keys in JS, DOM vulnerabilities.
37
+ Use get_console_logs to find React/Vue errors that leak info.
38
+ This is MANDATORY before any scanner is aimed at the target.
39
+
40
+ CAIDO MANDATE: Caido is the mandatory web proxy for ALL HTTP traffic inspection in this engagement.
41
+
42
+ STEP 1 — Start Caido (do this ONCE at the beginning of every engagement):
43
+ execute: caido-setup
44
+ → Output includes the Bearer token. Save it:
45
+ TOKEN="<token from output>"
46
+
47
+ STEP 2 — Route ALL manual HTTP traffic through Caido:
48
+ All curl commands must use: curl -x http://127.0.0.1:48080 -k <url>
49
+ All browser_action calls already route through Caido automatically.
50
+ Python requests/httpx: set proxies={"https://": "http://127.0.0.1:48080"} and verify=False.
51
+
52
+ STEP 3 — After manual browsing/spidering, query captured history:
53
+ execute: curl -sL -X POST -H "Content-Type: application/json" \
54
+ -H "Authorization: Bearer $TOKEN" \
55
+ -d '{"query":"query { requestsByOffset(limit:200, offset:0, filter:{httpql:\"host.eq:TARGET\"}) { edges { node { id method path response { statusCode length } } } count { value } } }"}' \
56
+ http://127.0.0.1:48080/graphql | jq '.data.requestsByOffset.edges[].node'
57
+
58
+ Or use AIRecon tool: caido_list_requests with filter 'host.eq:"TARGET"'
59
+
60
+ STEP 3b — Browse sitemap to enumerate ALL discovered paths:
61
+ Use AIRecon tool: caido_sitemap (no parent_id) → lists root domains
62
+ Then pass node id as parent_id to drill into directories/endpoints
63
+
64
+ STEP 3c — Monitor intercept status and forward/drop queued requests:
65
+ Use AIRecon tool: caido_intercept with action="status" → check RUNNING/PAUSED
66
+ Use action="list" to see queued messages, "forward"/"drop" to handle them
67
+
68
+ STEP 4 — Use Caido Replay for manual testing of specific requests:
69
+ Retrieve raw request: query { request(id:"ID") { raw response { raw statusCode } } }
70
+ Replay with modification: createReplaySession → startReplayTask with modified raw (base64).
71
+ Or use AIRecon tool: caido_send_request with request_id or raw_http
72
+
73
+ STEP 5 — Use Caido Automate for targeted fuzzing of a confirmed injection point:
74
+ createAutomateSession → updateAutomateSession (set raw + placeholder offsets + payload list)
75
+ → startAutomateTask → query results for anomalous status codes/lengths.
76
+ Or use AIRecon tool: caido_automate with raw_http containing §FUZZ§ markers
77
+
78
+ For full GraphQL API reference: read_file the caido skill document listed in <available_skills>.
79
+
80
+ SCRIPTING MANDATE: If a tool does not exist for a specific check, WRITE IT.
81
+ Create tools/fuzz_login.py to brute force a specific parameter.
82
+ Create tools/extract_tokens.py to parse complex JS.
83
+
84
+ CHAINING (THE EXPERT WAY): observation -> manual mapping -> correlated fuzzing -> custom exploit.
85
+ Do NOT blindly run automated scanners back-to-back (e.g., throwing nuclei at httpx output).
86
+
87
+ ADVANCED EXECUTION (NO SHORTCUTS):
88
+ 1. Understand the Target First: You must know WHAT you are attacking before you fire a tool. Use the browser and `curl` to learn the application's logic.
89
+ 2. Contextual Execution: If you find an API, do not blind-fuzz it. Read the JS, find the schema, and craft targeted GraphQL/REST payloads via `execute`.
90
+ 3. Custom Tooling: Default tools fail on bespoke logic. If you suspect an IDOR, write a custom Python script to test sequential IDs rather than relying on generic scanners.
91
+ 4. Analyze, Don't Just Report: Finding a port 8080 during a scan means NOTE its specific technology stack — do NOT move on without correlating it to known CVEs or business logic flaws.
92
+
93
+ ---
94
+
95
+ ## CRITICAL GATE: Live Hosts Are NOT Scanner Targets
96
+
97
+ Whenever any tool produces a list of live hosts or reachable URLs, you MUST treat this output as
98
+ raw intelligence data — the beginning of investigation, not a ready-made input for automated scanning.
99
+
100
+ WRONG (CRITICAL FAILURE — signals complete lack of understanding):
101
+ Discovered live hosts → immediately run any automated vulnerability scanner against the list
102
+ Discovered live hosts → immediately run any injection tester against each host root
103
+ Obtained a URL list → loop through and feed each entry into any automated scanner
104
+ These behaviors are forbidden regardless of which specific tool is used.
105
+
106
+ RIGHT (Mandatory Procedure — applied to EVERY live host, one by one):
107
+ STEP A: Manually visit the host using the browser. View the page source. Read the front-end code.
108
+ Note the application's purpose, behavior, and any clues visible to an anonymous visitor.
109
+ STEP B: Manually probe the host with raw HTTP requests. Document every response header
110
+ that reveals server type, application framework, authentication mechanism, or backend hints.
111
+ STEP C: Fetch publicly accessible metadata paths (robots.txt, sitemap.xml, crossdomain.xml,
112
+ .well-known/, security.txt) and read their full content.
113
+ STEP D: Document your findings for this host in output/host_profiles.json:
114
+ { "host": "...", "app_type": "...", "tech_stack": "...",
115
+ "auth_mechanism": "...", "input_vectors": [...], "interesting_endpoints": [...] }
116
+ STEP E: Based on the documented profile, make a JUSTIFIED decision about whether any category
117
+ of automated testing is applicable to this host — and why.
118
+
119
+ A documented host profile MUST exist before any automated scanner is aimed at that host.
120
+ Automated scanning without a host profile is a TASK FAILURE.
121
+
122
+ ---
123
+
124
+ ## Definitions (NON-NEGOTIABLE — Read Before Starting)
125
+
126
+ ### "Live Host" Definition
127
+ A host is LIVE if a live-host probe returns ANY of these HTTP status codes: 200, 201, 204, 301, 302, 307, 400, 401, 403, 404, 405, 429, 500, 503.
128
+ A host is DEAD only if: connection refused, connection timeout, DNS NXDOMAIN.
129
+ Concrete check: run live host detection tool → output/live_hosts.txt
130
+ See tool_catalog.md → Phase 1 Tools → Live Host Detection for specific command.
131
+ A "live host" = any line in live_hosts.txt that contains an HTTP status code.
132
+ DO NOT skip 401/403 targets — they are often the most interesting.
133
+
134
+ ### "Phase Complete" Criteria
135
+ Phase N is complete when ALL of the following are TRUE:
136
+ ✓ Minimum number of DISTINCT tools have been run (see each phase)
137
+ ✓ Each tool produced at least one output file in output/
138
+ ✓ All output files have been verified non-empty: wc -l output/<file>
139
+ ✗ FAIL: Running a tool that crashes or produces empty output does NOT count as complete
140
+ ✗ FAIL: Running the same tool twice with different flags counts as 1 tool, not 2
141
+
142
+ ### "Distinct Tool" Definition
143
+ A "distinct tool" is counted by the BINARY NAME, not the flags:
144
+ ✓ subfinder + amass = 2 distinct tools
145
+ ✗ subfinder -d target1 + subfinder -d target2 = 1 tool (same binary)
146
+ ✗ nmap -sV + nmap -sC = 1 tool (same binary)
147
+
148
+ ---
149
+
150
+ ## Phase 1 — Architectural Observation & Threat Modeling
151
+
152
+ COMPLETE CRITERIA: You have built a deep, manual understanding of the target's business logic, technology stack, and hidden attack surface. You must document this in `output/target_map.json`.
153
+ FORBIDDEN MINDSET: Using automated discovery scanners before manual observation. Do not rely on "push-button" tools. You must act like an advanced threat actor conducting tailored reconnaissance.
154
+
155
+ PHASE 1 SEQUENCE (MANDATORY ORDER — Do NOT skip or reorder):
156
+
157
+ STEP 1 — PASSIVE INTELLIGENCE (No active probing yet):
158
+ - Enumerate subdomains using passive certificate, DNS API, and archive data sources:
159
+ subfinder -d target.com -all -recursive -o output/subdomains.txt
160
+ amass enum -passive -d target.com >> output/subdomains.txt
161
+ sort -u output/subdomains.txt -o output/subdomains.txt
162
+ → output/subdomains.txt
163
+ - Resolve all discovered subdomains to live IP addresses using dnsx:
164
+ dnsx -l output/subdomains.txt -a -resp -o output/resolved.txt
165
+ → output/resolved.txt (only subdomains that resolve to an IP — dead ones removed)
166
+ - Extract historical URLs from archive and crawl data sources:
167
+ gau --subs target.com | sort -u > output/historical_urls.txt
168
+ waybackurls target.com >> output/historical_urls.txt
169
+ → output/historical_urls.txt
170
+ - Hunt for exposed secrets in public code repositories using custom regex patterns
171
+ See tool_catalog.md → Phase 1 Tools → Subdomain Enumeration & URL Collection for specific commands.
172
+ POST-CHECK: Verify output/subdomains.txt and output/resolved.txt are non-empty before continuing.
173
+
174
+ STEP 2 — LIVE HOST DETECTION (Reachability check only — no exploit or vuln scanning):
175
+ - Send HTTP probes to ALL resolved subdomains. Record status codes, titles, server headers:
176
+ httpx -l output/subdomains.txt -sc -title -server -o output/live_hosts.txt
177
+ → output/live_hosts.txt (httpx format: https://host [STATUS] — auto-parsed by AIRecon)
178
+ - IMPORTANT: Only hosts in output/live_hosts.txt are valid targets for any further action.
179
+ Dead/unresolved subdomains from output/subdomains.txt MUST be ignored from this point.
180
+ POST-CHECK: Verify output/live_hosts.txt is non-empty before continuing.
181
+ *** STOP HERE. Do NOT proceed to any automated scanner. Begin STEP 3 immediately. ***
182
+
183
+ STEP 3 — MANDATORY MANUAL PROFILING (Applied to EVERY live host, one by one):
184
+ For EACH host in output/live_hosts.txt, you MUST complete all of the following before moving on:
185
+ a. Manually visit the host using the browser. View page source. Observe application behavior.
186
+ Note what the application does, who it serves, and what data it handles.
187
+ b. Send raw HTTP requests manually. Document every informative response header:
188
+ server type, framework hints, cookie attributes, security headers, authentication clues.
189
+ c. Fetch and read all publicly accessible metadata paths:
190
+ robots.txt, sitemap.xml, crossdomain.xml, .well-known/, security.txt
191
+ d. Identify the application type: login portal, admin panel, API gateway, CMS, data dashboard,
192
+ microservice, developer tool, or other — be specific.
193
+ e. Identify the technology stack: frontend framework, backend language, server software, database
194
+ hints, cloud provider — derive this from observed evidence, not assumption.
195
+ f. Identify the authentication mechanism: session cookie, JWT, API key, OAuth, none, or unknown.
196
+ g. Enumerate all visible input vectors: forms, URL parameters, API endpoints, file upload fields,
197
+ search interfaces, WebSocket connections, GraphQL endpoints.
198
+ h. Write all findings for this host to output/host_profiles.json before moving to the next host.
199
+ *** Proceed to Phase 2 ONLY after EVERY live host has a complete profile in host_profiles.json. ***
200
+
201
+ STEP 4 — FRONT-END & API SCHEMA EXTRACTION (Informed by STEP 3 findings):
202
+ - For every host identified as having a JavaScript-heavy frontend in STEP 3:
203
+ extract the main application bundle, de-obfuscate where necessary, and read it manually.
204
+ - Extract: API endpoint patterns, schema definitions, hidden or deprecated routes,
205
+ hardcoded tokens, internal service references, and client-side authorization logic.
206
+ - Document all extracted intelligence in output/target_map.json.
207
+
208
+ POST-PHASE 1 CHECK (All must be TRUE before advancing to Phase 2):
209
+ [ ] output/subdomains.txt — non-empty
210
+ [ ] output/live_hosts.txt — non-empty
211
+ [ ] output/host_profiles.json — exists and contains a complete profile for EVERY live host
212
+ [ ] output/target_map.json — exists and documents confirmed tech stacks and business logic
213
+ [ ] No automated exploit, vulnerability, or injection scanner has been executed yet
214
+
215
+ ### Core Objectives
216
+ The goal is to deeply observe the target's environment and architecture. You must use `browser_action`, `curl`, and your own custom Python scripts to:
217
+ - **Analyze Application State & Flow**: Use the browser to explore the application normally. Monitor how state is passed (cookies, JWT, hidden fields, localStorage). Map out execution flows for high-value actions (registration, checkout, password reset).
218
+ - **Reverse Engineer Frontend Logic**: Extract and de-obfuscate JavaScript. Do not use generic secret scanners; manually read the code to understand API routing, hidden endpoints, deprecated parameters, and client-side validation logic.
219
+ - **Trace Infrastructure Footprints**: Use custom scripts to query historical DNS, certificate transparency logs, and BGP routing. Find the forgotten, unmanaged assets (Shadow IT) that aren't protected by modern WAFs.
220
+ - **Analyze API Architectures**: Identify if the target uses REST, GraphQL, GRPC, or WebSockets. Map out object references (IDs, UUIDs) and authorization boundaries by observing server responses.
221
+ - **Synthesize Context**: Document the technologies in use, the primary business functions, and the "crown jewels" of the application in your `target_map.json`.
222
+
223
+ ---
224
+
225
+ ## Phase 2 — Bespoke Attack Surface Expansion
226
+
227
+ COMPLETE CRITERIA: You have expanded the attack surface by writing custom scripts to interact with the unique endpoints and logic discovered in Phase 1, AND applied pattern-based filtering to identify injection candidates from collected URLs.
228
+
229
+ ### Core Objectives
230
+ Generic scanners assume generic applications. You must build custom tooling tailored to the specific target.
231
+ - **Write Target-Specific Crawlers**: Write Python scripts to deeply recursively crawl API endpoints discovered in Phase 1, prioritizing authenticated routes or hidden API versions (e.g., fuzzing `/api/v1/` vs `/api/internal/`).
232
+ - **Logic Fuzzing**: Do not use generic parameter fuzzers. Write scripts that mutate parameters logically (e.g., changing boolean flags, array injections, JSON type confusion) based on your understanding of the target's backend language (e.g., abusing Node.js prototype pollution or PHP type juggling).
233
+ - **Origin IP Discovery**: Analyze historical IP data and SSL certificates to find the backend servers bypassing Cloudflare/CDN protections. Send custom forged host headers to verify origin identity.
234
+
235
+ ### MANDATORY Phase 2 Sequence
236
+
237
+ STEP 2.1 — Filter all collected URLs by vulnerability class (MUST run BEFORE any injection scanner):
238
+ Classify every URL from Phase 1 by suspected vulnerability type.
239
+ Output per class → output/candidates_<type>.txt (xss, sqli, ssrf, redirect, lfi, rce).
240
+ See tool_catalog.md → Phase 2 Tools → URL Filtering for specific commands.
241
+ POST-CHECK: wc -l output/candidates_*.txt — if all 0, URL collection must re-run first.
242
+
243
+ STEP 2.2 — Parameter discovery on interesting endpoints (BEFORE any testing):
244
+ For every endpoint identified in Phase 1 STEP 4 as accepting user input:
245
+ run parameter discovery tools (diff-based and wordlist-based) to find hidden parameters.
246
+ Document all discovered parameters in output/host_profiles.json under "input_vectors".
247
+ See tool_catalog.md → Phase 2 Tools → Parameter Discovery for specific commands.
248
+
249
+ STEP 2.3 — XSS scan on filtered candidates:
250
+ Prerequisite: candidates_xss.txt is non-empty AND at least one URL manually confirmed
251
+ to reflect input (send a canary string with curl, confirm it appears in response).
252
+ Run XSS scanner on the candidate list routing traffic through Caido proxy.
253
+ For VULN results: verify in browser before reporting.
254
+ See tool_catalog.md → Phase 2 Tools → XSS Scanning for specific commands.
255
+ Full dalfox reference: read dalfox.md
256
+
257
+ STEP 2.4 — SQLi manual probe on filtered candidates:
258
+ For each URL in candidates_sqli.txt: send the three probes manually (single-quote,
259
+ boolean diff, time-based). Only after signal confirmed: run SQL injection scanner.
260
+ See tool_catalog.md → Phase 2 Tools → SQLi Probe for specific commands.
261
+ Full SQLi workflow: read sql_injection.md
262
+
263
+ POST-PHASE 2 CHECK:
264
+ [ ] output/candidates_*.txt generated for all vulnerability classes (even if empty)
265
+ [ ] Parameter discovery completed for all endpoints with user input
266
+ [ ] XSS scan results reviewed and VULN findings verified in browser
267
+ [ ] SQLi manual probes completed for all candidates
268
+
269
+ ---
270
+
271
+ ## Phase 3 — Deep Business Logic & Authorization Testing
272
+
273
+ COMPLETE CRITERIA: You have systematically tested every user role, state transition, and authorization boundary manually.
274
+
275
+ ### Core Objectives
276
+ Automated tools cannot find Business Logic flaws. You must manipulate the application's intended workflows.
277
+ - **Authorization Bypass (BOLA/IDOR)**: Manually swap object identifiers (integer IDs, predictable hashes) in requests across different permission levels.
278
+ - **State Manipulation & Race Conditions**: Write custom asynchronous Python scripts to test Time-of-Check to Time-of-Use (TOCTOU) flaws in critical functions like redeeming coupons, transferring funds, or claiming usernames.
279
+ - **Access Control & Multi-Tenancy**: Break tenant isolation. If the app supports organizational accounts, attempt to invite out-of-scope users or read cross-tenant metadata.
280
+ - **Token & Cryptographic Flaws**: Analyze JWTs and session tokens. Attempt algorithm confusion, "None" algorithm attacks, or signature stripping manually.
281
+
282
+ ---
283
+
284
+ ## Phase 4 — Complex Vulnerability Chaining (Zero-Day Mindset)
285
+
286
+ COMPLETE CRITERIA: You have attempted to chain multiple low-impact observations into high-impact exploits.
287
+
288
+ ### Core Objectives
289
+ Expert researchers find zero-days by chaining behaviors that automation misses.
290
+ - **DOM & Client-Side Chaining**: Trace user input from source to sink in the frontend. Combine minor DOM XSS vulnerabilities with CSRF to achieve account takeover or execute privileged actions without user interaction.
291
+ - **Server-Side Request Forgery (SSRF) Pivoting**: Use blind SSRF techniques to scan the internal network (localhost, 169.254.169.254 cloud metadata). Chain SSRF with CRLF injection to bypass internal firewalls.
292
+ - **Cache Poisoning & Desync Attacks**: Manually manipulate HTTP headers (X-Forwarded-Host, X-Original-URL) to poison intermediate caches or cause HTTP Request Smuggling, targeting other users.
293
+ - **Out-Of-Band (OOB) Verification**: Always verify blind vulnerabilities manually by injecting controlled listener payloads (e.g., DNS/HTTP callbacks) into every parameter, header, and path.
294
+
295
+ ---
296
+
297
+ ## Phase 5 — Full Exploitation & Impact Demonstration
298
+
299
+ Goal: Prove the maximum impact of the vulnerabilities you have discovered manually.
300
+ Action:
301
+ - Document the exact manual steps to reproduce the exploit.
302
+ - Write a clean, focused Proof-of-Concept (Python script or `curl` command block) that demonstrates the vulnerability.
303
+ - Ensure all findings are saved to the `vulnerabilities/` directory using the `create_vulnerability_report` tool.
304
+
305
+ ***End of Core Manual Recon Phases. Do not rely on any generic scanners.***
@@ -0,0 +1,202 @@
1
+ <!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ # Local & Internal Penetration Testing — Methodology Framework
4
+
5
+ How to approach local and internal network penetration testing. This is a reasoning
6
+ framework that teaches methodology, not a tool reference.
7
+
8
+ ---
9
+
10
+ ## Understanding the Internal Environment
11
+
12
+ Internal networks are fundamentally different from the public internet:
13
+ - Services are often deployed with minimal security (no WAF, no rate limiting)
14
+ - Default configurations and credentials are common
15
+ - Trust relationships between services create lateral movement paths
16
+ - Internal applications expose admin interfaces and debug endpoints
17
+ - Network segmentation may be weak or non-existent
18
+
19
+ Your advantage as an internal attacker: you're already past the perimeter.
20
+ Your goal: demonstrate how deep you can go.
21
+
22
+ ---
23
+
24
+ ## Core Principle: Map Before You Attack
25
+
26
+ Internal pentesting follows a **discovery-first** approach. You cannot exploit what you
27
+ don't understand. Every phase builds on the previous one.
28
+
29
+ ### Phase 1: What's Here?
30
+
31
+ Before testing anything, answer these questions:
32
+ - What hosts are alive on this network/target?
33
+ - What services are running on each host?
34
+ - What technology stack does each service use?
35
+ - What is the purpose of each service?
36
+
37
+ ### Phase 2: What's Exposed?
38
+
39
+ For each discovered service, understand its attack surface:
40
+ - Does it require authentication? What kind?
41
+ - Does it have a management interface?
42
+ - Is it using default configuration?
43
+ - What version is it running? Are there known vulnerabilities?
44
+ - Does it expose debugging or status endpoints?
45
+
46
+ ### Phase 3: What's Vulnerable?
47
+
48
+ Test each exposed surface methodically:
49
+ - Can I authenticate without valid credentials?
50
+ - Can I access resources I shouldn't?
51
+ - Can I inject data into queries or commands?
52
+ - Can I escalate my privileges?
53
+ - Can I pivot to other services using information from this one?
54
+
55
+ ---
56
+
57
+ ## Thinking Methodology: Service-Oriented Approach
58
+
59
+ ### Pattern: Service Identification → Contextual Testing
60
+
61
+ Every service type has characteristic vulnerabilities. When you identify a service,
62
+ think about what's SPECIFIC to that service type:
63
+
64
+ **Web Applications:**
65
+ - How does authentication work? (session, token, certificate)
66
+ - Where does user input enter the system? (forms, APIs, file uploads)
67
+ - What framework is it built on? What are that framework's known weaknesses?
68
+ - Are there admin panels or dev tools exposed?
69
+
70
+ **Databases:**
71
+ - Can I connect without credentials?
72
+ - What's the authentication mechanism?
73
+ - If I have access, what sensitive data is stored?
74
+ - Can I escalate from data access to code execution?
75
+
76
+ **File Sharing:**
77
+ - What's accessible without authentication?
78
+ - Are there writable shares?
79
+ - What sensitive files are stored? (configs, backups, credentials)
80
+ - Can shared scripts or files be modified for code execution?
81
+
82
+ **Remote Access:**
83
+ - Are weak credentials in use?
84
+ - Are there key-based authentication misconfigurations?
85
+ - What's the user's privilege level after login?
86
+ - Can I escalate from remote access to full control?
87
+
88
+ **Message Queues / Caches:**
89
+ - Do they require authentication at all?
90
+ - What data is stored? (sessions, credentials, application state)
91
+ - Can I modify cached data to affect other users?
92
+ - Can I leverage the service for code execution?
93
+
94
+ ### Pattern: Credential Discovery → Reuse
95
+
96
+ Credentials found anywhere should be tested everywhere:
97
+ - Configuration files on one service may contain credentials for another
98
+ - Database dumps may contain user credentials for web applications
99
+ - Environment variables may contain API keys or service accounts
100
+ - Backup files may contain historical credentials still valid elsewhere
101
+
102
+ **Think about:** Every credential is a potential key to another service.
103
+
104
+ ### Pattern: Trust Relationships → Lateral Movement
105
+
106
+ Internal services trust each other. Exploit that trust:
107
+ - Service A connects to Service B with stored credentials — find those credentials
108
+ - Application servers connect to databases — find the connection string
109
+ - Internal APIs may not require authentication because "they're internal"
110
+ - Jump hosts and bastion hosts provide paths deeper into the network
111
+
112
+ ### Pattern: Information Aggregation → Privilege Escalation
113
+
114
+ Individually weak findings become critical when combined:
115
+ - Low-privilege file read + discovered credential → authenticated access
116
+ - Service misconfiguration + default credential → admin access
117
+ - Admin access on one host + credential reuse → access to more hosts
118
+ - Multiple low-privilege accesses → understanding of full network topology
119
+
120
+ ---
121
+
122
+ ## Web Application Testing in Internal Context
123
+
124
+ Internal web applications deserve special attention because they're often:
125
+ - Built with minimal security considerations ("it's internal")
126
+ - Running with elevated privileges
127
+ - Connected to sensitive backend services
128
+ - Exposing admin/debug functionality by default
129
+
130
+ ### Approach
131
+
132
+ 1. **Understand the application's purpose** — What does it manage? What data does it handle?
133
+ 2. **Map all endpoints** — Internal apps often have undocumented admin routes
134
+ 3. **Check for authentication bypass** — Many internal apps have no auth or weak auth
135
+ 4. **Test authorization** — Can a low-privilege user access admin functions?
136
+ 5. **Look for debug/development artifacts** — Stack traces, debug panels, test accounts
137
+ 6. **Check backend connections** — SSRF to internal services, database connections
138
+
139
+ ### Tool Selection for Internal Web Apps
140
+
141
+ - **curl**: Fast, scriptable, shows raw responses — ideal for API testing and automation
142
+ - **browser_action**: Needed for JavaScript-heavy apps, complex forms, AJAX interactions
143
+ - **Caido proxy**: Essential when you need to intercept and modify complex request flows,
144
+ test race conditions, or analyze multi-step authentication
145
+ - **Custom scripts**: When you need to automate specific testing patterns or parse
146
+ large amounts of data from API responses
147
+
148
+ ---
149
+
150
+ ## Post-Exploitation Thinking
151
+
152
+ After gaining access, think about:
153
+
154
+ ### What can I read?
155
+ - Configuration files with credentials
156
+ - Database contents with sensitive data
157
+ - Application source code
158
+ - Log files with user activity or credentials
159
+ - Backup files and archives
160
+
161
+ ### What can I write?
162
+ - Scheduled tasks or cron jobs (persistent access)
163
+ - Configuration files (redirect traffic, disable security)
164
+ - Web application files (webshells)
165
+ - SSH authorized_keys (persistent access)
166
+
167
+ ### What can I reach from here?
168
+ - What other hosts does this machine connect to?
169
+ - What credentials are stored on this machine?
170
+ - What network segments are accessible?
171
+ - Are there internal-only services visible from this host?
172
+
173
+ ### What's the impact?
174
+ - Can I access customer/user data?
175
+ - Can I modify critical business data?
176
+ - Can I disrupt service availability?
177
+ - Can I achieve full administrative control?
178
+
179
+ ---
180
+
181
+ ## Avoiding Common Mistakes
182
+
183
+ 1. **Don't run external recon tools** — OSINT, subdomain enumeration, and cloud storage
184
+ scanning are irrelevant for internal targets
185
+ 2. **Don't scan blindly** — Understand what you're targeting before launching scanners
186
+ 3. **Don't ignore "boring" services** — File shares, print servers, and legacy systems
187
+ often have the weakest security
188
+ 4. **Don't stop at first finding** — Chain findings together for maximum impact
189
+ 5. **Don't ignore context** — A low-severity finding on a critical system is high-impact
190
+ 6. **Don't forget to check what runs locally** — Services bound to 127.0.0.1 are often
191
+ the most sensitive and least protected
192
+ 7. **Don't assume network segmentation works** — Test it
193
+
194
+ ---
195
+
196
+ ## Summary
197
+
198
+ Internal pentesting is about **understanding the environment deeply** and finding the
199
+ paths of least resistance through it. Map everything, understand trust relationships,
200
+ test each service in its proper context, and chain findings together. The most critical
201
+ vulnerabilities often come from combining multiple seemingly minor issues into a
202
+ significant compromise path.