@pensar/apex 0.0.90-canary.97fbe7e3 → 0.0.90
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/index.js +26 -92
- package/package.json +1 -1
package/build/index.js
CHANGED
|
@@ -31971,7 +31971,7 @@ var package_default2;
|
|
|
31971
31971
|
var init_package = __esm(() => {
|
|
31972
31972
|
package_default2 = {
|
|
31973
31973
|
name: "@pensar/apex",
|
|
31974
|
-
version: "0.0.90
|
|
31974
|
+
version: "0.0.90",
|
|
31975
31975
|
description: "AI-powered penetration testing CLI tool with terminal UI",
|
|
31976
31976
|
module: "src/tui/index.tsx",
|
|
31977
31977
|
main: "build/index.js",
|
|
@@ -89342,21 +89342,10 @@ var init_session = __esm(() => {
|
|
|
89342
89342
|
};
|
|
89343
89343
|
});
|
|
89344
89344
|
|
|
89345
|
-
// src/lib/cwe/types.ts
|
|
89346
|
-
var CweEntrySchema;
|
|
89347
|
-
var init_types2 = __esm(() => {
|
|
89348
|
-
init_zod();
|
|
89349
|
-
CweEntrySchema = exports_external.object({
|
|
89350
|
-
id: exports_external.string().regex(/^CWE-\d+$/, "Must be CWE-<number> format"),
|
|
89351
|
-
reasoning: exports_external.string().describe("Why this CWE applies to the observed vulnerability")
|
|
89352
|
-
});
|
|
89353
|
-
});
|
|
89354
|
-
|
|
89355
89345
|
// src/core/report/schemas.ts
|
|
89356
89346
|
var PentestReportFindingSchema, PentestReportSchema, REPORT_VERSION = "1.0";
|
|
89357
89347
|
var init_schemas3 = __esm(() => {
|
|
89358
89348
|
init_zod();
|
|
89359
|
-
init_types2();
|
|
89360
89349
|
PentestReportFindingSchema = exports_external.object({
|
|
89361
89350
|
title: exports_external.string(),
|
|
89362
89351
|
severity: exports_external.enum(["CRITICAL", "HIGH", "MEDIUM", "LOW"]),
|
|
@@ -89366,8 +89355,7 @@ var init_schemas3 = __esm(() => {
|
|
|
89366
89355
|
endpoint: exports_external.string(),
|
|
89367
89356
|
pocPath: exports_external.string(),
|
|
89368
89357
|
remediation: exports_external.string(),
|
|
89369
|
-
references: exports_external.string().optional()
|
|
89370
|
-
cwes: exports_external.array(CweEntrySchema).optional()
|
|
89358
|
+
references: exports_external.string().optional()
|
|
89371
89359
|
});
|
|
89372
89360
|
PentestReportSchema = exports_external.object({
|
|
89373
89361
|
version: exports_external.string().regex(/^1\.\d+$/),
|
|
@@ -89481,12 +89469,6 @@ function renderFinding(finding, metadata) {
|
|
|
89481
89469
|
finding.evidence,
|
|
89482
89470
|
"```",
|
|
89483
89471
|
"",
|
|
89484
|
-
...finding.cwes?.length ? [
|
|
89485
|
-
"## CWE Classification",
|
|
89486
|
-
"",
|
|
89487
|
-
...finding.cwes.map((cwe) => `- **${cwe.id}** — ${cwe.reasoning}`),
|
|
89488
|
-
""
|
|
89489
|
-
] : [],
|
|
89490
89472
|
"## POC",
|
|
89491
89473
|
"",
|
|
89492
89474
|
`Path: \`${finding.pocPath}\``,
|
|
@@ -90238,7 +90220,7 @@ function loadAttackSurfaceResults2(resultsPath) {
|
|
|
90238
90220
|
const data = readFileSync6(resultsPath, "utf-8");
|
|
90239
90221
|
return JSON.parse(data);
|
|
90240
90222
|
}
|
|
90241
|
-
var
|
|
90223
|
+
var init_types2 = () => {};
|
|
90242
90224
|
|
|
90243
90225
|
// src/core/ai/index.ts
|
|
90244
90226
|
var init_ai2 = __esm(() => {
|
|
@@ -90351,7 +90333,7 @@ var init_zod_compat = __esm(() => {
|
|
|
90351
90333
|
|
|
90352
90334
|
// node_modules/@modelcontextprotocol/sdk/dist/esm/types.js
|
|
90353
90335
|
var LATEST_PROTOCOL_VERSION = "2025-11-25", SUPPORTED_PROTOCOL_VERSIONS, RELATED_TASK_META_KEY = "io.modelcontextprotocol/related-task", JSONRPC_VERSION = "2.0", AssertObjectSchema, ProgressTokenSchema, CursorSchema, TaskCreationParamsSchema, TaskMetadataSchema, RelatedTaskMetadataSchema, RequestMetaSchema, BaseRequestParamsSchema, TaskAugmentedRequestParamsSchema, isTaskAugmentedRequestParams = (value) => TaskAugmentedRequestParamsSchema.safeParse(value).success, RequestSchema, NotificationsParamsSchema, NotificationSchema, ResultSchema, RequestIdSchema, JSONRPCRequestSchema, isJSONRPCRequest = (value) => JSONRPCRequestSchema.safeParse(value).success, JSONRPCNotificationSchema, isJSONRPCNotification = (value) => JSONRPCNotificationSchema.safeParse(value).success, JSONRPCResultResponseSchema, isJSONRPCResultResponse = (value) => JSONRPCResultResponseSchema.safeParse(value).success, ErrorCode, JSONRPCErrorResponseSchema, isJSONRPCErrorResponse = (value) => JSONRPCErrorResponseSchema.safeParse(value).success, JSONRPCMessageSchema, JSONRPCResponseSchema, EmptyResultSchema, CancelledNotificationParamsSchema, CancelledNotificationSchema, IconSchema, IconsSchema, BaseMetadataSchema, ImplementationSchema, FormElicitationCapabilitySchema, ElicitationCapabilitySchema, ClientTasksCapabilitySchema, ServerTasksCapabilitySchema, ClientCapabilitiesSchema, InitializeRequestParamsSchema, InitializeRequestSchema, ServerCapabilitiesSchema, InitializeResultSchema, InitializedNotificationSchema, PingRequestSchema, ProgressSchema, ProgressNotificationParamsSchema, ProgressNotificationSchema, PaginatedRequestParamsSchema, PaginatedRequestSchema, PaginatedResultSchema, TaskStatusSchema, TaskSchema, CreateTaskResultSchema, TaskStatusNotificationParamsSchema, TaskStatusNotificationSchema, GetTaskRequestSchema, GetTaskResultSchema, GetTaskPayloadRequestSchema, GetTaskPayloadResultSchema, ListTasksRequestSchema, ListTasksResultSchema, CancelTaskRequestSchema, CancelTaskResultSchema, ResourceContentsSchema, TextResourceContentsSchema, Base64Schema, BlobResourceContentsSchema, RoleSchema, AnnotationsSchema, ResourceSchema, ResourceTemplateSchema, ListResourcesRequestSchema, ListResourcesResultSchema, ListResourceTemplatesRequestSchema, ListResourceTemplatesResultSchema, ResourceRequestParamsSchema, ReadResourceRequestParamsSchema, ReadResourceRequestSchema, ReadResourceResultSchema, ResourceListChangedNotificationSchema, SubscribeRequestParamsSchema, SubscribeRequestSchema, UnsubscribeRequestParamsSchema, UnsubscribeRequestSchema, ResourceUpdatedNotificationParamsSchema, ResourceUpdatedNotificationSchema, PromptArgumentSchema, PromptSchema, ListPromptsRequestSchema, ListPromptsResultSchema, GetPromptRequestParamsSchema, GetPromptRequestSchema, TextContentSchema, ImageContentSchema, AudioContentSchema, ToolUseContentSchema, EmbeddedResourceSchema, ResourceLinkSchema, ContentBlockSchema, PromptMessageSchema, GetPromptResultSchema, PromptListChangedNotificationSchema, ToolAnnotationsSchema, ToolExecutionSchema, ToolSchema, ListToolsRequestSchema, ListToolsResultSchema, CallToolResultSchema, CompatibilityCallToolResultSchema, CallToolRequestParamsSchema, CallToolRequestSchema, ToolListChangedNotificationSchema, ListChangedOptionsBaseSchema, LoggingLevelSchema, SetLevelRequestParamsSchema, SetLevelRequestSchema, LoggingMessageNotificationParamsSchema, LoggingMessageNotificationSchema, ModelHintSchema, ModelPreferencesSchema, ToolChoiceSchema, ToolResultContentSchema, SamplingContentSchema, SamplingMessageContentBlockSchema, SamplingMessageSchema, CreateMessageRequestParamsSchema, CreateMessageRequestSchema, CreateMessageResultSchema, CreateMessageResultWithToolsSchema, BooleanSchemaSchema, StringSchemaSchema, NumberSchemaSchema, UntitledSingleSelectEnumSchemaSchema, TitledSingleSelectEnumSchemaSchema, LegacyTitledEnumSchemaSchema, SingleSelectEnumSchemaSchema, UntitledMultiSelectEnumSchemaSchema, TitledMultiSelectEnumSchemaSchema, MultiSelectEnumSchemaSchema, EnumSchemaSchema, PrimitiveSchemaDefinitionSchema, ElicitRequestFormParamsSchema, ElicitRequestURLParamsSchema, ElicitRequestParamsSchema, ElicitRequestSchema, ElicitationCompleteNotificationParamsSchema, ElicitationCompleteNotificationSchema, ElicitResultSchema, ResourceTemplateReferenceSchema, PromptReferenceSchema, CompleteRequestParamsSchema, CompleteRequestSchema, CompleteResultSchema, RootSchema, ListRootsRequestSchema, ListRootsResultSchema, RootsListChangedNotificationSchema, ClientRequestSchema, ClientNotificationSchema, ClientResultSchema, ServerRequestSchema, ServerNotificationSchema, ServerResultSchema, McpError, UrlElicitationRequiredError;
|
|
90354
|
-
var
|
|
90336
|
+
var init_types3 = __esm(() => {
|
|
90355
90337
|
init_v4();
|
|
90356
90338
|
SUPPORTED_PROTOCOL_VERSIONS = [LATEST_PROTOCOL_VERSION, "2025-06-18", "2025-03-26", "2024-11-05", "2024-10-07"];
|
|
90357
90339
|
AssertObjectSchema = custom2((v2) => v2 !== null && (typeof v2 === "object" || typeof v2 === "function"));
|
|
@@ -92252,7 +92234,7 @@ function mergeCapabilities(base, additional) {
|
|
|
92252
92234
|
var DEFAULT_REQUEST_TIMEOUT_MSEC = 60000;
|
|
92253
92235
|
var init_protocol = __esm(() => {
|
|
92254
92236
|
init_zod_compat();
|
|
92255
|
-
|
|
92237
|
+
init_types3();
|
|
92256
92238
|
init_zod_json_schema_compat();
|
|
92257
92239
|
});
|
|
92258
92240
|
|
|
@@ -104302,7 +104284,7 @@ class ExperimentalClientTasks {
|
|
|
104302
104284
|
}
|
|
104303
104285
|
}
|
|
104304
104286
|
var init_client = __esm(() => {
|
|
104305
|
-
|
|
104287
|
+
init_types3();
|
|
104306
104288
|
});
|
|
104307
104289
|
|
|
104308
104290
|
// node_modules/@modelcontextprotocol/sdk/dist/esm/experimental/tasks/helpers.js
|
|
@@ -104385,7 +104367,7 @@ function getSupportedElicitationModes(capabilities) {
|
|
|
104385
104367
|
var Client;
|
|
104386
104368
|
var init_client2 = __esm(() => {
|
|
104387
104369
|
init_protocol();
|
|
104388
|
-
|
|
104370
|
+
init_types3();
|
|
104389
104371
|
init_ajv_provider();
|
|
104390
104372
|
init_zod_compat();
|
|
104391
104373
|
init_client();
|
|
@@ -105300,7 +105282,7 @@ function serializeMessage(message) {
|
|
|
105300
105282
|
`;
|
|
105301
105283
|
}
|
|
105302
105284
|
var init_stdio = __esm(() => {
|
|
105303
|
-
|
|
105285
|
+
init_types3();
|
|
105304
105286
|
});
|
|
105305
105287
|
|
|
105306
105288
|
// node_modules/@modelcontextprotocol/sdk/dist/esm/client/stdio.js
|
|
@@ -107210,7 +107192,7 @@ function getSeverityFromScore(score) {
|
|
|
107210
107192
|
return "HIGH";
|
|
107211
107193
|
return "CRITICAL";
|
|
107212
107194
|
}
|
|
107213
|
-
var
|
|
107195
|
+
var init_types4 = () => {};
|
|
107214
107196
|
|
|
107215
107197
|
// src/lib/cvss/macrovector-scores.ts
|
|
107216
107198
|
var MACROVECTOR_LOOKUP, METRIC_LEVELS, MAX_SEVERITY, STEP = 0.1, EPSILON;
|
|
@@ -107784,7 +107766,7 @@ function getScoreType(metrics) {
|
|
|
107784
107766
|
}
|
|
107785
107767
|
var BASE_METRICS, THREAT_METRICS, ENVIRONMENTAL_METRICS, SUPPLEMENTAL_METRICS;
|
|
107786
107768
|
var init_calculator = __esm(() => {
|
|
107787
|
-
|
|
107769
|
+
init_types4();
|
|
107788
107770
|
init_macrovector_scores();
|
|
107789
107771
|
BASE_METRICS = [
|
|
107790
107772
|
"AV",
|
|
@@ -107821,7 +107803,7 @@ var init_calculator = __esm(() => {
|
|
|
107821
107803
|
|
|
107822
107804
|
// src/lib/cvss/index.ts
|
|
107823
107805
|
var init_cvss = __esm(() => {
|
|
107824
|
-
|
|
107806
|
+
init_types4();
|
|
107825
107807
|
init_calculator();
|
|
107826
107808
|
init_macrovector_scores();
|
|
107827
107809
|
});
|
|
@@ -107846,8 +107828,7 @@ async function scoreFindingWithCVSS(input, model, authConfig, abortSignal) {
|
|
|
107846
107828
|
vectorString: cvssResult.vectorString,
|
|
107847
107829
|
metrics: cvssResult.metrics,
|
|
107848
107830
|
scoreType: cvssResult.scoreType,
|
|
107849
|
-
reasoning: assessment.reasoning
|
|
107850
|
-
cwes: assessment.cwes
|
|
107831
|
+
reasoning: assessment.reasoning
|
|
107851
107832
|
};
|
|
107852
107833
|
}
|
|
107853
107834
|
function truncateField(value, limit) {
|
|
@@ -108031,45 +108012,11 @@ var CVSSMetricsOutputSchema, CVSS_SCORER_SYSTEM_PROMPT = `You are a CVSS 4.0 sco
|
|
|
108031
108012
|
6. Assess impact on both the vulnerable system AND potential subsequent systems
|
|
108032
108013
|
7. Since a POC exists and confirmed the vulnerability, E should typically be 'A'
|
|
108033
108014
|
|
|
108034
|
-
Always provide brief reasoning explaining your key decisions
|
|
108035
|
-
|
|
108036
|
-
## CWE Assignment Guidelines
|
|
108037
|
-
|
|
108038
|
-
In addition to CVSS metrics, assign one or more CWE identifiers to the finding. For each CWE, provide a brief reasoning explaining why it applies.
|
|
108039
|
-
|
|
108040
|
-
### Common CWE Mappings
|
|
108041
|
-
|
|
108042
|
-
| Vulnerability Class | Primary CWE | Related CWEs |
|
|
108043
|
-
|---------------------|------------|--------------|
|
|
108044
|
-
| SQL Injection | CWE-89 | CWE-564 (Hibernate), CWE-943 (NoSQL) |
|
|
108045
|
-
| Cross-Site Scripting (XSS) | CWE-79 | CWE-80 (Basic XSS), CWE-87 (Alt XSS) |
|
|
108046
|
-
| Command/OS Injection | CWE-78 | CWE-77 (Command Injection) |
|
|
108047
|
-
| Code Injection / RCE | CWE-94 | CWE-95 (Eval Injection), CWE-96 (Static Code Injection) |
|
|
108048
|
-
| IDOR / Access Control | CWE-639 | CWE-284 (Improper Access Control), CWE-862 (Missing AuthZ) |
|
|
108049
|
-
| SSRF | CWE-918 | — |
|
|
108050
|
-
| Path Traversal / LFI | CWE-22 | CWE-23 (Relative Path), CWE-36 (Absolute Path) |
|
|
108051
|
-
| XXE | CWE-611 | CWE-776 (Recursive Entity) |
|
|
108052
|
-
| SSTI | CWE-1336 | CWE-94 (Code Injection) |
|
|
108053
|
-
| CSRF | CWE-352 | — |
|
|
108054
|
-
| Deserialization | CWE-502 | — |
|
|
108055
|
-
| Open Redirect | CWE-601 | — |
|
|
108056
|
-
| Information Disclosure | CWE-200 | CWE-209 (Error Messages), CWE-532 (Log Files) |
|
|
108057
|
-
| Authentication Bypass | CWE-287 | CWE-306 (Missing Auth) |
|
|
108058
|
-
| Cryptographic Issues | CWE-327 | CWE-328 (Weak Hash), CWE-330 (Insufficient Randomness) |
|
|
108059
|
-
|
|
108060
|
-
### CWE Assignment Rules
|
|
108061
|
-
|
|
108062
|
-
1. Assign the **most specific applicable CWE(s)** — prefer CWE-89 (SQL Injection) over CWE-74 (generic Injection).
|
|
108063
|
-
2. Use the standard \`CWE-<number>\` format (e.g., CWE-89, not "CWE 89" or "89").
|
|
108064
|
-
3. Assign **1-3 CWEs** per finding. Multiple CWEs are appropriate when the vulnerability spans categories (e.g., an IDOR that also leaks PII: CWE-639 + CWE-200).
|
|
108065
|
-
4. Order CWEs by relevance — the primary weakness first.
|
|
108066
|
-
5. When the vulnerability class is provided, use it as a strong hint but verify against the evidence.
|
|
108067
|
-
6. For each CWE, provide a specific reasoning explaining why it applies to *this* finding — not a generic definition of the CWE.`, MAX_EVIDENCE_CHARS = 1e4, MAX_DESCRIPTION_CHARS = 3000, MAX_IMPACT_CHARS = 2000;
|
|
108015
|
+
Always provide brief reasoning explaining your key decisions.`, MAX_EVIDENCE_CHARS = 1e4, MAX_DESCRIPTION_CHARS = 3000, MAX_IMPACT_CHARS = 2000;
|
|
108068
108016
|
var init_cvssScorer = __esm(() => {
|
|
108069
108017
|
init_zod();
|
|
108070
108018
|
init_ai2();
|
|
108071
108019
|
init_cvss();
|
|
108072
|
-
init_types2();
|
|
108073
108020
|
CVSSMetricsOutputSchema = exports_external.object({
|
|
108074
108021
|
metrics: exports_external.object({
|
|
108075
108022
|
AV: exports_external.enum(["N", "A", "L", "P"]).describe("Attack Vector: N=Network (remotely exploitable), A=Adjacent network, L=Local access required, P=Physical access required"),
|
|
@@ -108085,8 +108032,7 @@ var init_cvssScorer = __esm(() => {
|
|
|
108085
108032
|
SA: exports_external.enum(["H", "L", "N"]).describe("Availability Impact on Subsequent Systems: H=High, L=Low, N=None"),
|
|
108086
108033
|
E: exports_external.enum(["A", "P", "U"]).describe("Exploit Maturity: A=Attacked (working exploit exists), P=POC available, U=Unreported")
|
|
108087
108034
|
}),
|
|
108088
|
-
reasoning: exports_external.string().describe("Brief explanation (2-3 sentences) of the key factors that influenced the metric choices")
|
|
108089
|
-
cwes: exports_external.array(CweEntrySchema).describe("CWE classifications for this vulnerability, most specific first")
|
|
108035
|
+
reasoning: exports_external.string().describe("Brief explanation (2-3 sentences) of the key factors that influenced the metric choices")
|
|
108090
108036
|
});
|
|
108091
108037
|
});
|
|
108092
108038
|
|
|
@@ -108111,8 +108057,7 @@ FINDING STRUCTURE:
|
|
|
108111
108057
|
- Impact: Business and technical consequences if exploited
|
|
108112
108058
|
- Evidence: Commands run, responses received, proof of exploitation
|
|
108113
108059
|
- Remediation: Specific, actionable steps to fix
|
|
108114
|
-
- References: CVE, CWE, OWASP, or security advisories
|
|
108115
|
-
- Vulnerability Class: The class of vulnerability (e.g., sqli, xss, command-injection) — improves CWE accuracy`,
|
|
108060
|
+
- References: CVE, CWE, OWASP, or security advisories`,
|
|
108116
108061
|
inputSchema: documentVulnerabilityInputSchema,
|
|
108117
108062
|
execute: async (input) => {
|
|
108118
108063
|
try {
|
|
@@ -108137,8 +108082,7 @@ FINDING STRUCTURE:
|
|
|
108137
108082
|
impact: input.impact,
|
|
108138
108083
|
evidence: evidenceForPrompt,
|
|
108139
108084
|
endpoint: input.endpoint,
|
|
108140
|
-
remediation: input.remediation
|
|
108141
|
-
vulnerabilityClass: input.vulnerabilityClass
|
|
108085
|
+
remediation: input.remediation
|
|
108142
108086
|
},
|
|
108143
108087
|
agentMessages: []
|
|
108144
108088
|
}, ctx4.model, ctx4.authConfig, ctx4.abortSignal);
|
|
@@ -108171,7 +108115,6 @@ FINDING STRUCTURE:
|
|
|
108171
108115
|
sessionId: session.id,
|
|
108172
108116
|
target: session.targets[0],
|
|
108173
108117
|
...evidenceFilePath && { evidenceFile: evidenceFilePath },
|
|
108174
|
-
cwes: cvssResult.cwes,
|
|
108175
108118
|
cvss: {
|
|
108176
108119
|
score: cvssResult.score,
|
|
108177
108120
|
severity: cvssResult.severity,
|
|
@@ -108201,10 +108144,6 @@ FINDING STRUCTURE:
|
|
|
108201
108144
|
**Score Type:** ${cvssResult.scoreType}
|
|
108202
108145
|
|
|
108203
108146
|
**Reasoning:** ${cvssResult.reasoning}`;
|
|
108204
|
-
const cweSection = cvssResult.cwes?.length ? `## CWE Classification
|
|
108205
|
-
|
|
108206
|
-
${cvssResult.cwes.map((cwe) => `- **${cwe.id}** — ${cwe.reasoning}`).join(`
|
|
108207
|
-
`)}` : "";
|
|
108208
108147
|
const evidenceSection = evidenceFilePath ? `## Evidence
|
|
108209
108148
|
|
|
108210
108149
|
\`\`\`
|
|
@@ -108236,9 +108175,7 @@ ${finding.impact}
|
|
|
108236
108175
|
|
|
108237
108176
|
${cvssSection}
|
|
108238
108177
|
|
|
108239
|
-
${
|
|
108240
|
-
|
|
108241
|
-
` : ""}${evidenceSection}
|
|
108178
|
+
${evidenceSection}
|
|
108242
108179
|
|
|
108243
108180
|
## POC
|
|
108244
108181
|
|
|
@@ -108258,8 +108195,7 @@ ${finding.references}` : ""}
|
|
|
108258
108195
|
`;
|
|
108259
108196
|
writeFileSync7(mdPath, markdown);
|
|
108260
108197
|
const summaryPath = join11(session.rootPath, "findings-summary.md");
|
|
108261
|
-
const
|
|
108262
|
-
const summaryEntry = `- [${finding.severity}] (CVSS ${cvssResult.score})${cweTag} ${finding.title} - \`findings/${mdFilename}\`
|
|
108198
|
+
const summaryEntry = `- [${finding.severity}] (CVSS ${cvssResult.score}) ${finding.title} - \`findings/${mdFilename}\`
|
|
108263
108199
|
`;
|
|
108264
108200
|
try {
|
|
108265
108201
|
appendFileSync2(summaryPath, summaryEntry);
|
|
@@ -108312,7 +108248,6 @@ var init_documentFinding = __esm(() => {
|
|
|
108312
108248
|
pocPath: exports_external.string().describe("Relative path to the POC script (e.g., pocs/poc_sqli.sh)"),
|
|
108313
108249
|
remediation: exports_external.string().describe("Steps to fix the issue"),
|
|
108314
108250
|
references: exports_external.string().optional().describe("CVE, CWE, or related references"),
|
|
108315
|
-
vulnerabilityClass: exports_external.string().optional().describe("The class of vulnerability (e.g., sqli, xss, command-injection, idor, ssrf, path-traversal, crypto, cve)"),
|
|
108316
108251
|
toolCallDescription: exports_external.string().describe("A concise, human-readable description of what this tool call is doing (e.g., 'Documenting SQL injection finding')")
|
|
108317
108252
|
});
|
|
108318
108253
|
FALLBACK_CVSS = {
|
|
@@ -108334,8 +108269,7 @@ var init_documentFinding = __esm(() => {
|
|
|
108334
108269
|
E: "A"
|
|
108335
108270
|
},
|
|
108336
108271
|
scoreType: "CVSS-BT",
|
|
108337
|
-
reasoning: "CVSS scoring unavailable — using conservative MEDIUM default."
|
|
108338
|
-
cwes: []
|
|
108272
|
+
reasoning: "CVSS scoring unavailable — using conservative MEDIUM default."
|
|
108339
108273
|
};
|
|
108340
108274
|
});
|
|
108341
108275
|
|
|
@@ -110970,7 +110904,7 @@ For each app you identified, spawn a coding agent with a detailed objective. The
|
|
|
110970
110904
|
|
|
110971
110905
|
// src/core/agents/specialized/whiteboxAttackSurface/types.ts
|
|
110972
110906
|
var RiskScoreBreakdownSchema, RiskScoreSchema, EndpointSchema, AppSchema, WhiteboxAttackSurfaceResultSchema;
|
|
110973
|
-
var
|
|
110907
|
+
var init_types5 = __esm(() => {
|
|
110974
110908
|
init_zod();
|
|
110975
110909
|
RiskScoreBreakdownSchema = exports_external.object({
|
|
110976
110910
|
exposure: exports_external.number().min(0).max(3).describe("Exposure Level (0-3): 3=Public no auth, 2=Standard user login, 1=Privileged/admin access, 0=Private/internal-only"),
|
|
@@ -111044,7 +110978,7 @@ var init_agent2 = __esm(() => {
|
|
|
111044
110978
|
init_dist5();
|
|
111045
110979
|
init_dist5();
|
|
111046
110980
|
init_offensiveSecurityAgent();
|
|
111047
|
-
|
|
110981
|
+
init_types5();
|
|
111048
110982
|
WhiteboxAttackSurfaceAgent = class WhiteboxAttackSurfaceAgent extends OffensiveSecurityAgent {
|
|
111049
110983
|
constructor(opts) {
|
|
111050
110984
|
const {
|
|
@@ -193939,7 +193873,7 @@ function createInitialOperatorState(initialMode = "manual", requireApproval = tr
|
|
|
193939
193873
|
};
|
|
193940
193874
|
}
|
|
193941
193875
|
var OPERATOR_STAGES, OperatorSettingsObject2;
|
|
193942
|
-
var
|
|
193876
|
+
var init_types6 = __esm(() => {
|
|
193943
193877
|
init_zod();
|
|
193944
193878
|
OPERATOR_STAGES = {
|
|
193945
193879
|
setup: {
|
|
@@ -194137,11 +194071,11 @@ var init_approvalGate = __esm(() => {
|
|
|
194137
194071
|
|
|
194138
194072
|
// src/core/operator/stageManager.ts
|
|
194139
194073
|
var init_stageManager = __esm(() => {
|
|
194140
|
-
|
|
194074
|
+
init_types6();
|
|
194141
194075
|
});
|
|
194142
194076
|
// src/core/operator/index.ts
|
|
194143
194077
|
var init_operator = __esm(() => {
|
|
194144
|
-
|
|
194078
|
+
init_types6();
|
|
194145
194079
|
init_toolClassifier();
|
|
194146
194080
|
init_approvalGate();
|
|
194147
194081
|
init_stageManager();
|
|
@@ -194458,7 +194392,7 @@ var BlackboxAttackSurfaceAgent;
|
|
|
194458
194392
|
var init_blackboxAgent = __esm(() => {
|
|
194459
194393
|
init_dist5();
|
|
194460
194394
|
init_utils2();
|
|
194461
|
-
|
|
194395
|
+
init_types2();
|
|
194462
194396
|
init_offensiveSecurityAgent();
|
|
194463
194397
|
BlackboxAttackSurfaceAgent = class BlackboxAttackSurfaceAgent extends OffensiveSecurityAgent {
|
|
194464
194398
|
constructor(opts) {
|
|
@@ -195435,7 +195369,7 @@ When your objective includes structured output, call \`response\` with your fina
|
|
|
195435
195369
|
var init_whiteboxAttackSurface = __esm(() => {
|
|
195436
195370
|
init_zod();
|
|
195437
195371
|
init_agent3();
|
|
195438
|
-
|
|
195372
|
+
init_types5();
|
|
195439
195373
|
init_riskScoring();
|
|
195440
195374
|
AppInfoSchema = exports_external.object({
|
|
195441
195375
|
name: exports_external.string().describe("Application or service name"),
|