@pensar/apex 0.0.13 → 0.0.14
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/benchmark.js +2 -47
- package/build/index.js +2 -47
- package/build/quicktest.js +2 -47
- package/build/swarm.js +2 -47
- package/package.json +1 -1
package/build/benchmark.js
CHANGED
|
@@ -43280,54 +43280,9 @@ Create this POC, test it, then retry document_finding.`,
|
|
|
43280
43280
|
};
|
|
43281
43281
|
const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
|
|
43282
43282
|
const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
|
|
43283
|
-
const filename = `${findingId}.
|
|
43283
|
+
const filename = `${findingId}.json`;
|
|
43284
43284
|
const filepath = join2(session.findingsPath, filename);
|
|
43285
|
-
|
|
43286
|
-
|
|
43287
|
-
**Severity:** ${finding2.severity}
|
|
43288
|
-
**Target:** ${session.target}
|
|
43289
|
-
**Date:** ${timestamp}
|
|
43290
|
-
**Session:** ${session.id}
|
|
43291
|
-
**POC:** \`${finding2.pocPath}\`
|
|
43292
|
-
|
|
43293
|
-
## Description
|
|
43294
|
-
|
|
43295
|
-
${finding2.description}
|
|
43296
|
-
|
|
43297
|
-
## Impact
|
|
43298
|
-
|
|
43299
|
-
${finding2.impact}
|
|
43300
|
-
|
|
43301
|
-
## Evidence
|
|
43302
|
-
|
|
43303
|
-
\`\`\`
|
|
43304
|
-
${finding2.evidence}
|
|
43305
|
-
\`\`\`
|
|
43306
|
-
|
|
43307
|
-
## Proof of Concept
|
|
43308
|
-
|
|
43309
|
-
A working POC script is available at: \`${finding2.pocPath}\`
|
|
43310
|
-
|
|
43311
|
-
To reproduce this vulnerability, run:
|
|
43312
|
-
\`\`\`bash
|
|
43313
|
-
cd ${session.rootPath}
|
|
43314
|
-
./${finding2.pocPath}
|
|
43315
|
-
\`\`\`
|
|
43316
|
-
|
|
43317
|
-
## Remediation
|
|
43318
|
-
|
|
43319
|
-
${finding2.remediation}
|
|
43320
|
-
|
|
43321
|
-
${finding2.references ? `## References
|
|
43322
|
-
|
|
43323
|
-
${finding2.references}` : ""}
|
|
43324
|
-
|
|
43325
|
-
---
|
|
43326
|
-
|
|
43327
|
-
*This finding was automatically documented by the Pensar penetration testing agent.*
|
|
43328
|
-
*POC verified and available at: ${finding2.pocPath}*
|
|
43329
|
-
`;
|
|
43330
|
-
writeFileSync2(filepath, markdown);
|
|
43285
|
+
writeFileSync2(filepath, JSON.stringify(findingWithMeta, null, 2));
|
|
43331
43286
|
const summaryPath = join2(session.rootPath, "findings-summary.md");
|
|
43332
43287
|
const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
|
|
43333
43288
|
`;
|
package/build/index.js
CHANGED
|
@@ -73392,54 +73392,9 @@ Create this POC, test it, then retry document_finding.`,
|
|
|
73392
73392
|
};
|
|
73393
73393
|
const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
|
|
73394
73394
|
const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
|
|
73395
|
-
const filename = `${findingId}.
|
|
73395
|
+
const filename = `${findingId}.json`;
|
|
73396
73396
|
const filepath = join3(session.findingsPath, filename);
|
|
73397
|
-
|
|
73398
|
-
|
|
73399
|
-
**Severity:** ${finding2.severity}
|
|
73400
|
-
**Target:** ${session.target}
|
|
73401
|
-
**Date:** ${timestamp}
|
|
73402
|
-
**Session:** ${session.id}
|
|
73403
|
-
**POC:** \`${finding2.pocPath}\`
|
|
73404
|
-
|
|
73405
|
-
## Description
|
|
73406
|
-
|
|
73407
|
-
${finding2.description}
|
|
73408
|
-
|
|
73409
|
-
## Impact
|
|
73410
|
-
|
|
73411
|
-
${finding2.impact}
|
|
73412
|
-
|
|
73413
|
-
## Evidence
|
|
73414
|
-
|
|
73415
|
-
\`\`\`
|
|
73416
|
-
${finding2.evidence}
|
|
73417
|
-
\`\`\`
|
|
73418
|
-
|
|
73419
|
-
## Proof of Concept
|
|
73420
|
-
|
|
73421
|
-
A working POC script is available at: \`${finding2.pocPath}\`
|
|
73422
|
-
|
|
73423
|
-
To reproduce this vulnerability, run:
|
|
73424
|
-
\`\`\`bash
|
|
73425
|
-
cd ${session.rootPath}
|
|
73426
|
-
./${finding2.pocPath}
|
|
73427
|
-
\`\`\`
|
|
73428
|
-
|
|
73429
|
-
## Remediation
|
|
73430
|
-
|
|
73431
|
-
${finding2.remediation}
|
|
73432
|
-
|
|
73433
|
-
${finding2.references ? `## References
|
|
73434
|
-
|
|
73435
|
-
${finding2.references}` : ""}
|
|
73436
|
-
|
|
73437
|
-
---
|
|
73438
|
-
|
|
73439
|
-
*This finding was automatically documented by the Pensar penetration testing agent.*
|
|
73440
|
-
*POC verified and available at: ${finding2.pocPath}*
|
|
73441
|
-
`;
|
|
73442
|
-
writeFileSync3(filepath, markdown);
|
|
73397
|
+
writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
|
|
73443
73398
|
const summaryPath = join3(session.rootPath, "findings-summary.md");
|
|
73444
73399
|
const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
|
|
73445
73400
|
`;
|
package/build/quicktest.js
CHANGED
|
@@ -42026,54 +42026,9 @@ Create this POC, test it, then retry document_finding.`,
|
|
|
42026
42026
|
};
|
|
42027
42027
|
const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
|
|
42028
42028
|
const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
|
|
42029
|
-
const filename = `${findingId}.
|
|
42029
|
+
const filename = `${findingId}.json`;
|
|
42030
42030
|
const filepath = join3(session.findingsPath, filename);
|
|
42031
|
-
|
|
42032
|
-
|
|
42033
|
-
**Severity:** ${finding2.severity}
|
|
42034
|
-
**Target:** ${session.target}
|
|
42035
|
-
**Date:** ${timestamp}
|
|
42036
|
-
**Session:** ${session.id}
|
|
42037
|
-
**POC:** \`${finding2.pocPath}\`
|
|
42038
|
-
|
|
42039
|
-
## Description
|
|
42040
|
-
|
|
42041
|
-
${finding2.description}
|
|
42042
|
-
|
|
42043
|
-
## Impact
|
|
42044
|
-
|
|
42045
|
-
${finding2.impact}
|
|
42046
|
-
|
|
42047
|
-
## Evidence
|
|
42048
|
-
|
|
42049
|
-
\`\`\`
|
|
42050
|
-
${finding2.evidence}
|
|
42051
|
-
\`\`\`
|
|
42052
|
-
|
|
42053
|
-
## Proof of Concept
|
|
42054
|
-
|
|
42055
|
-
A working POC script is available at: \`${finding2.pocPath}\`
|
|
42056
|
-
|
|
42057
|
-
To reproduce this vulnerability, run:
|
|
42058
|
-
\`\`\`bash
|
|
42059
|
-
cd ${session.rootPath}
|
|
42060
|
-
./${finding2.pocPath}
|
|
42061
|
-
\`\`\`
|
|
42062
|
-
|
|
42063
|
-
## Remediation
|
|
42064
|
-
|
|
42065
|
-
${finding2.remediation}
|
|
42066
|
-
|
|
42067
|
-
${finding2.references ? `## References
|
|
42068
|
-
|
|
42069
|
-
${finding2.references}` : ""}
|
|
42070
|
-
|
|
42071
|
-
---
|
|
42072
|
-
|
|
42073
|
-
*This finding was automatically documented by the Pensar penetration testing agent.*
|
|
42074
|
-
*POC verified and available at: ${finding2.pocPath}*
|
|
42075
|
-
`;
|
|
42076
|
-
writeFileSync3(filepath, markdown);
|
|
42031
|
+
writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
|
|
42077
42032
|
const summaryPath = join3(session.rootPath, "findings-summary.md");
|
|
42078
42033
|
const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
|
|
42079
42034
|
`;
|
package/build/swarm.js
CHANGED
|
@@ -42026,54 +42026,9 @@ Create this POC, test it, then retry document_finding.`,
|
|
|
42026
42026
|
};
|
|
42027
42027
|
const safeTitle = finding2.title.toLowerCase().replace(/[^a-z0-9]+/g, "-").replace(/^-|-$/g, "").substring(0, 50);
|
|
42028
42028
|
const findingId = `${timestamp.split("T")[0]}-${safeTitle}`;
|
|
42029
|
-
const filename = `${findingId}.
|
|
42029
|
+
const filename = `${findingId}.json`;
|
|
42030
42030
|
const filepath = join3(session.findingsPath, filename);
|
|
42031
|
-
|
|
42032
|
-
|
|
42033
|
-
**Severity:** ${finding2.severity}
|
|
42034
|
-
**Target:** ${session.target}
|
|
42035
|
-
**Date:** ${timestamp}
|
|
42036
|
-
**Session:** ${session.id}
|
|
42037
|
-
**POC:** \`${finding2.pocPath}\`
|
|
42038
|
-
|
|
42039
|
-
## Description
|
|
42040
|
-
|
|
42041
|
-
${finding2.description}
|
|
42042
|
-
|
|
42043
|
-
## Impact
|
|
42044
|
-
|
|
42045
|
-
${finding2.impact}
|
|
42046
|
-
|
|
42047
|
-
## Evidence
|
|
42048
|
-
|
|
42049
|
-
\`\`\`
|
|
42050
|
-
${finding2.evidence}
|
|
42051
|
-
\`\`\`
|
|
42052
|
-
|
|
42053
|
-
## Proof of Concept
|
|
42054
|
-
|
|
42055
|
-
A working POC script is available at: \`${finding2.pocPath}\`
|
|
42056
|
-
|
|
42057
|
-
To reproduce this vulnerability, run:
|
|
42058
|
-
\`\`\`bash
|
|
42059
|
-
cd ${session.rootPath}
|
|
42060
|
-
./${finding2.pocPath}
|
|
42061
|
-
\`\`\`
|
|
42062
|
-
|
|
42063
|
-
## Remediation
|
|
42064
|
-
|
|
42065
|
-
${finding2.remediation}
|
|
42066
|
-
|
|
42067
|
-
${finding2.references ? `## References
|
|
42068
|
-
|
|
42069
|
-
${finding2.references}` : ""}
|
|
42070
|
-
|
|
42071
|
-
---
|
|
42072
|
-
|
|
42073
|
-
*This finding was automatically documented by the Pensar penetration testing agent.*
|
|
42074
|
-
*POC verified and available at: ${finding2.pocPath}*
|
|
42075
|
-
`;
|
|
42076
|
-
writeFileSync3(filepath, markdown);
|
|
42031
|
+
writeFileSync3(filepath, JSON.stringify(findingWithMeta, null, 2));
|
|
42077
42032
|
const summaryPath = join3(session.rootPath, "findings-summary.md");
|
|
42078
42033
|
const summaryEntry = `- [${finding2.severity}] ${finding2.title} - \`findings/${filename}\` - POC: \`${finding2.pocPath}\`
|
|
42079
42034
|
`;
|