@pensar/apex 0.0.13 → 0.0.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -43280,54 +43280,9 @@ Create this POC, test it, then retry document_finding.`,
43280
43280
  };
43281
43281
  const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
43282
43282
  const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
43283
- const filename = `${findingId}.md`;
43283
+ const filename = `${findingId}.json`;
43284
43284
  const filepath = join2(session.findingsPath, filename);
43285
- const markdown = `# ${finding2.title}
43286
-
43287
- **Severity:** ${finding2.severity}
43288
- **Target:** ${session.target}
43289
- **Date:** ${timestamp}
43290
- **Session:** ${session.id}
43291
- **POC:** \`${finding2.pocPath}\`
43292
-
43293
- ## Description
43294
-
43295
- ${finding2.description}
43296
-
43297
- ## Impact
43298
-
43299
- ${finding2.impact}
43300
-
43301
- ## Evidence
43302
-
43303
- \`\`\`
43304
- ${finding2.evidence}
43305
- \`\`\`
43306
-
43307
- ## Proof of Concept
43308
-
43309
- A working POC script is available at: \`${finding2.pocPath}\`
43310
-
43311
- To reproduce this vulnerability, run:
43312
- \`\`\`bash
43313
- cd ${session.rootPath}
43314
- ./${finding2.pocPath}
43315
- \`\`\`
43316
-
43317
- ## Remediation
43318
-
43319
- ${finding2.remediation}
43320
-
43321
- ${finding2.references ? `## References
43322
-
43323
- ${finding2.references}` : ""}
43324
-
43325
- ---
43326
-
43327
- *This finding was automatically documented by the Pensar penetration testing agent.*
43328
- *POC verified and available at: ${finding2.pocPath}*
43329
- `;
43330
- writeFileSync2(filepath, markdown);
43285
+ writeFileSync2(filepath, JSON.stringify(findingWithMeta, null, 2));
43331
43286
  const summaryPath = join2(session.rootPath, "findings-summary.md");
43332
43287
  const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
43333
43288
  `;
package/build/index.js CHANGED
@@ -73392,54 +73392,9 @@ Create this POC, test it, then retry document_finding.`,
73392
73392
  };
73393
73393
  const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
73394
73394
  const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
73395
- const filename = `${findingId}.md`;
73395
+ const filename = `${findingId}.json`;
73396
73396
  const filepath = join3(session.findingsPath, filename);
73397
- const markdown = `# ${finding2.title}
73398
-
73399
- **Severity:** ${finding2.severity}
73400
- **Target:** ${session.target}
73401
- **Date:** ${timestamp}
73402
- **Session:** ${session.id}
73403
- **POC:** \`${finding2.pocPath}\`
73404
-
73405
- ## Description
73406
-
73407
- ${finding2.description}
73408
-
73409
- ## Impact
73410
-
73411
- ${finding2.impact}
73412
-
73413
- ## Evidence
73414
-
73415
- \`\`\`
73416
- ${finding2.evidence}
73417
- \`\`\`
73418
-
73419
- ## Proof of Concept
73420
-
73421
- A working POC script is available at: \`${finding2.pocPath}\`
73422
-
73423
- To reproduce this vulnerability, run:
73424
- \`\`\`bash
73425
- cd ${session.rootPath}
73426
- ./${finding2.pocPath}
73427
- \`\`\`
73428
-
73429
- ## Remediation
73430
-
73431
- ${finding2.remediation}
73432
-
73433
- ${finding2.references ? `## References
73434
-
73435
- ${finding2.references}` : ""}
73436
-
73437
- ---
73438
-
73439
- *This finding was automatically documented by the Pensar penetration testing agent.*
73440
- *POC verified and available at: ${finding2.pocPath}*
73441
- `;
73442
- writeFileSync3(filepath, markdown);
73397
+ writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
73443
73398
  const summaryPath = join3(session.rootPath, "findings-summary.md");
73444
73399
  const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
73445
73400
  `;
@@ -42026,54 +42026,9 @@ Create this POC, test it, then retry document_finding.`,
42026
42026
  };
42027
42027
  const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
42028
42028
  const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
42029
- const filename = `${findingId}.md`;
42029
+ const filename = `${findingId}.json`;
42030
42030
  const filepath = join3(session.findingsPath, filename);
42031
- const markdown = `# ${finding2.title}
42032
-
42033
- **Severity:** ${finding2.severity}
42034
- **Target:** ${session.target}
42035
- **Date:** ${timestamp}
42036
- **Session:** ${session.id}
42037
- **POC:** \`${finding2.pocPath}\`
42038
-
42039
- ## Description
42040
-
42041
- ${finding2.description}
42042
-
42043
- ## Impact
42044
-
42045
- ${finding2.impact}
42046
-
42047
- ## Evidence
42048
-
42049
- \`\`\`
42050
- ${finding2.evidence}
42051
- \`\`\`
42052
-
42053
- ## Proof of Concept
42054
-
42055
- A working POC script is available at: \`${finding2.pocPath}\`
42056
-
42057
- To reproduce this vulnerability, run:
42058
- \`\`\`bash
42059
- cd ${session.rootPath}
42060
- ./${finding2.pocPath}
42061
- \`\`\`
42062
-
42063
- ## Remediation
42064
-
42065
- ${finding2.remediation}
42066
-
42067
- ${finding2.references ? `## References
42068
-
42069
- ${finding2.references}` : ""}
42070
-
42071
- ---
42072
-
42073
- *This finding was automatically documented by the Pensar penetration testing agent.*
42074
- *POC verified and available at: ${finding2.pocPath}*
42075
- `;
42076
- writeFileSync3(filepath, markdown);
42031
+ writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
42077
42032
  const summaryPath = join3(session.rootPath, "findings-summary.md");
42078
42033
  const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
42079
42034
  `;
package/build/swarm.js CHANGED
@@ -42026,54 +42026,9 @@ Create this POC, test it, then retry document_finding.`,
42026
42026
  };
42027
42027
  const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
42028
42028
  const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
42029
- const filename = `${findingId}.md`;
42029
+ const filename = `${findingId}.json`;
42030
42030
  const filepath = join3(session.findingsPath, filename);
42031
- const markdown = `# ${finding2.title}
42032
-
42033
- **Severity:** ${finding2.severity}
42034
- **Target:** ${session.target}
42035
- **Date:** ${timestamp}
42036
- **Session:** ${session.id}
42037
- **POC:** \`${finding2.pocPath}\`
42038
-
42039
- ## Description
42040
-
42041
- ${finding2.description}
42042
-
42043
- ## Impact
42044
-
42045
- ${finding2.impact}
42046
-
42047
- ## Evidence
42048
-
42049
- \`\`\`
42050
- ${finding2.evidence}
42051
- \`\`\`
42052
-
42053
- ## Proof of Concept
42054
-
42055
- A working POC script is available at: \`${finding2.pocPath}\`
42056
-
42057
- To reproduce this vulnerability, run:
42058
- \`\`\`bash
42059
- cd ${session.rootPath}
42060
- ./${finding2.pocPath}
42061
- \`\`\`
42062
-
42063
- ## Remediation
42064
-
42065
- ${finding2.remediation}
42066
-
42067
- ${finding2.references ? `## References
42068
-
42069
- ${finding2.references}` : ""}
42070
-
42071
- ---
42072
-
42073
- *This finding was automatically documented by the Pensar penetration testing agent.*
42074
- *POC verified and available at: ${finding2.pocPath}*
42075
- `;
42076
- writeFileSync3(filepath, markdown);
42031
+ writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
42077
42032
  const summaryPath = join3(session.rootPath, "findings-summary.md");
42078
42033
  const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
42079
42034
  `;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pensar/apex",
3
- "version": "0.0.13",
3
+ "version": "0.0.14",
4
4
  "description": "AI-powered penetration testing CLI tool with terminal UI",
5
5
  "module": "src/tui/index.tsx",
6
6
  "main": "build/index.js",