@pensar/apex 0.0.90-canary.97fbe7e3 → 0.0.90

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/build/index.js +26 -92
  2. package/package.json +1 -1
package/build/index.js CHANGED
@@ -31971,7 +31971,7 @@ var package_default2;
31971
31971
  var init_package = __esm(() => {
31972
31972
  package_default2 = {
31973
31973
  name: "@pensar/apex",
31974
- version: "0.0.90-canary.97fbe7e3",
31974
+ version: "0.0.90",
31975
31975
  description: "AI-powered penetration testing CLI tool with terminal UI",
31976
31976
  module: "src/tui/index.tsx",
31977
31977
  main: "build/index.js",
@@ -89342,21 +89342,10 @@ var init_session = __esm(() => {
89342
89342
  };
89343
89343
  });
89344
89344
 
89345
- // src/lib/cwe/types.ts
89346
- var CweEntrySchema;
89347
- var init_types2 = __esm(() => {
89348
- init_zod();
89349
- CweEntrySchema = exports_external.object({
89350
- id: exports_external.string().regex(/^CWE-\d+$/, "Must be CWE-<number> format"),
89351
- reasoning: exports_external.string().describe("Why this CWE applies to the observed vulnerability")
89352
- });
89353
- });
89354
-
89355
89345
  // src/core/report/schemas.ts
89356
89346
  var PentestReportFindingSchema, PentestReportSchema, REPORT_VERSION = "1.0";
89357
89347
  var init_schemas3 = __esm(() => {
89358
89348
  init_zod();
89359
- init_types2();
89360
89349
  PentestReportFindingSchema = exports_external.object({
89361
89350
  title: exports_external.string(),
89362
89351
  severity: exports_external.enum(["CRITICAL", "HIGH", "MEDIUM", "LOW"]),
@@ -89366,8 +89355,7 @@ var init_schemas3 = __esm(() => {
89366
89355
  endpoint: exports_external.string(),
89367
89356
  pocPath: exports_external.string(),
89368
89357
  remediation: exports_external.string(),
89369
- references: exports_external.string().optional(),
89370
- cwes: exports_external.array(CweEntrySchema).optional()
89358
+ references: exports_external.string().optional()
89371
89359
  });
89372
89360
  PentestReportSchema = exports_external.object({
89373
89361
  version: exports_external.string().regex(/^1\.\d+$/),
@@ -89481,12 +89469,6 @@ function renderFinding(finding, metadata) {
89481
89469
  finding.evidence,
89482
89470
  "```",
89483
89471
  "",
89484
- ...finding.cwes?.length ? [
89485
- "## CWE Classification",
89486
- "",
89487
- ...finding.cwes.map((cwe) => `- **${cwe.id}** — ${cwe.reasoning}`),
89488
- ""
89489
- ] : [],
89490
89472
  "## POC",
89491
89473
  "",
89492
89474
  `Path: \`${finding.pocPath}\``,
@@ -90238,7 +90220,7 @@ function loadAttackSurfaceResults2(resultsPath) {
90238
90220
  const data = readFileSync6(resultsPath, "utf-8");
90239
90221
  return JSON.parse(data);
90240
90222
  }
90241
- var init_types3 = () => {};
90223
+ var init_types2 = () => {};
90242
90224
 
90243
90225
  // src/core/ai/index.ts
90244
90226
  var init_ai2 = __esm(() => {
@@ -90351,7 +90333,7 @@ var init_zod_compat = __esm(() => {
90351
90333
 
90352
90334
  // node_modules/@modelcontextprotocol/sdk/dist/esm/types.js
90353
90335
  var LATEST_PROTOCOL_VERSION = "2025-11-25", SUPPORTED_PROTOCOL_VERSIONS, RELATED_TASK_META_KEY = "io.modelcontextprotocol/related-task", JSONRPC_VERSION = "2.0", AssertObjectSchema, ProgressTokenSchema, CursorSchema, TaskCreationParamsSchema, TaskMetadataSchema, RelatedTaskMetadataSchema, RequestMetaSchema, BaseRequestParamsSchema, TaskAugmentedRequestParamsSchema, isTaskAugmentedRequestParams = (value) => TaskAugmentedRequestParamsSchema.safeParse(value).success, RequestSchema, NotificationsParamsSchema, NotificationSchema, ResultSchema, RequestIdSchema, JSONRPCRequestSchema, isJSONRPCRequest = (value) => JSONRPCRequestSchema.safeParse(value).success, JSONRPCNotificationSchema, isJSONRPCNotification = (value) => JSONRPCNotificationSchema.safeParse(value).success, JSONRPCResultResponseSchema, isJSONRPCResultResponse = (value) => JSONRPCResultResponseSchema.safeParse(value).success, ErrorCode, JSONRPCErrorResponseSchema, isJSONRPCErrorResponse = (value) => JSONRPCErrorResponseSchema.safeParse(value).success, JSONRPCMessageSchema, JSONRPCResponseSchema, EmptyResultSchema, CancelledNotificationParamsSchema, CancelledNotificationSchema, IconSchema, IconsSchema, BaseMetadataSchema, ImplementationSchema, FormElicitationCapabilitySchema, ElicitationCapabilitySchema, ClientTasksCapabilitySchema, ServerTasksCapabilitySchema, ClientCapabilitiesSchema, InitializeRequestParamsSchema, InitializeRequestSchema, ServerCapabilitiesSchema, InitializeResultSchema, InitializedNotificationSchema, PingRequestSchema, ProgressSchema, ProgressNotificationParamsSchema, ProgressNotificationSchema, PaginatedRequestParamsSchema, PaginatedRequestSchema, PaginatedResultSchema, TaskStatusSchema, TaskSchema, CreateTaskResultSchema, TaskStatusNotificationParamsSchema, TaskStatusNotificationSchema, GetTaskRequestSchema, GetTaskResultSchema, GetTaskPayloadRequestSchema, GetTaskPayloadResultSchema, ListTasksRequestSchema, ListTasksResultSchema, CancelTaskRequestSchema, CancelTaskResultSchema, ResourceContentsSchema, TextResourceContentsSchema, Base64Schema, BlobResourceContentsSchema, RoleSchema, AnnotationsSchema, ResourceSchema, ResourceTemplateSchema, ListResourcesRequestSchema, ListResourcesResultSchema, ListResourceTemplatesRequestSchema, ListResourceTemplatesResultSchema, ResourceRequestParamsSchema, ReadResourceRequestParamsSchema, ReadResourceRequestSchema, ReadResourceResultSchema, ResourceListChangedNotificationSchema, SubscribeRequestParamsSchema, SubscribeRequestSchema, UnsubscribeRequestParamsSchema, UnsubscribeRequestSchema, ResourceUpdatedNotificationParamsSchema, ResourceUpdatedNotificationSchema, PromptArgumentSchema, PromptSchema, ListPromptsRequestSchema, ListPromptsResultSchema, GetPromptRequestParamsSchema, GetPromptRequestSchema, TextContentSchema, ImageContentSchema, AudioContentSchema, ToolUseContentSchema, EmbeddedResourceSchema, ResourceLinkSchema, ContentBlockSchema, PromptMessageSchema, GetPromptResultSchema, PromptListChangedNotificationSchema, ToolAnnotationsSchema, ToolExecutionSchema, ToolSchema, ListToolsRequestSchema, ListToolsResultSchema, CallToolResultSchema, CompatibilityCallToolResultSchema, CallToolRequestParamsSchema, CallToolRequestSchema, ToolListChangedNotificationSchema, ListChangedOptionsBaseSchema, LoggingLevelSchema, SetLevelRequestParamsSchema, SetLevelRequestSchema, LoggingMessageNotificationParamsSchema, LoggingMessageNotificationSchema, ModelHintSchema, ModelPreferencesSchema, ToolChoiceSchema, ToolResultContentSchema, SamplingContentSchema, SamplingMessageContentBlockSchema, SamplingMessageSchema, CreateMessageRequestParamsSchema, CreateMessageRequestSchema, CreateMessageResultSchema, CreateMessageResultWithToolsSchema, BooleanSchemaSchema, StringSchemaSchema, NumberSchemaSchema, UntitledSingleSelectEnumSchemaSchema, TitledSingleSelectEnumSchemaSchema, LegacyTitledEnumSchemaSchema, SingleSelectEnumSchemaSchema, UntitledMultiSelectEnumSchemaSchema, TitledMultiSelectEnumSchemaSchema, MultiSelectEnumSchemaSchema, EnumSchemaSchema, PrimitiveSchemaDefinitionSchema, ElicitRequestFormParamsSchema, ElicitRequestURLParamsSchema, ElicitRequestParamsSchema, ElicitRequestSchema, ElicitationCompleteNotificationParamsSchema, ElicitationCompleteNotificationSchema, ElicitResultSchema, ResourceTemplateReferenceSchema, PromptReferenceSchema, CompleteRequestParamsSchema, CompleteRequestSchema, CompleteResultSchema, RootSchema, ListRootsRequestSchema, ListRootsResultSchema, RootsListChangedNotificationSchema, ClientRequestSchema, ClientNotificationSchema, ClientResultSchema, ServerRequestSchema, ServerNotificationSchema, ServerResultSchema, McpError, UrlElicitationRequiredError;
90354
- var init_types4 = __esm(() => {
90336
+ var init_types3 = __esm(() => {
90355
90337
  init_v4();
90356
90338
  SUPPORTED_PROTOCOL_VERSIONS = [LATEST_PROTOCOL_VERSION, "2025-06-18", "2025-03-26", "2024-11-05", "2024-10-07"];
90357
90339
  AssertObjectSchema = custom2((v2) => v2 !== null && (typeof v2 === "object" || typeof v2 === "function"));
@@ -92252,7 +92234,7 @@ function mergeCapabilities(base, additional) {
92252
92234
  var DEFAULT_REQUEST_TIMEOUT_MSEC = 60000;
92253
92235
  var init_protocol = __esm(() => {
92254
92236
  init_zod_compat();
92255
- init_types4();
92237
+ init_types3();
92256
92238
  init_zod_json_schema_compat();
92257
92239
  });
92258
92240
 
@@ -104302,7 +104284,7 @@ class ExperimentalClientTasks {
104302
104284
  }
104303
104285
  }
104304
104286
  var init_client = __esm(() => {
104305
- init_types4();
104287
+ init_types3();
104306
104288
  });
104307
104289
 
104308
104290
  // node_modules/@modelcontextprotocol/sdk/dist/esm/experimental/tasks/helpers.js
@@ -104385,7 +104367,7 @@ function getSupportedElicitationModes(capabilities) {
104385
104367
  var Client;
104386
104368
  var init_client2 = __esm(() => {
104387
104369
  init_protocol();
104388
- init_types4();
104370
+ init_types3();
104389
104371
  init_ajv_provider();
104390
104372
  init_zod_compat();
104391
104373
  init_client();
@@ -105300,7 +105282,7 @@ function serializeMessage(message) {
105300
105282
  `;
105301
105283
  }
105302
105284
  var init_stdio = __esm(() => {
105303
- init_types4();
105285
+ init_types3();
105304
105286
  });
105305
105287
 
105306
105288
  // node_modules/@modelcontextprotocol/sdk/dist/esm/client/stdio.js
@@ -107210,7 +107192,7 @@ function getSeverityFromScore(score) {
107210
107192
  return "HIGH";
107211
107193
  return "CRITICAL";
107212
107194
  }
107213
- var init_types5 = () => {};
107195
+ var init_types4 = () => {};
107214
107196
 
107215
107197
  // src/lib/cvss/macrovector-scores.ts
107216
107198
  var MACROVECTOR_LOOKUP, METRIC_LEVELS, MAX_SEVERITY, STEP = 0.1, EPSILON;
@@ -107784,7 +107766,7 @@ function getScoreType(metrics) {
107784
107766
  }
107785
107767
  var BASE_METRICS, THREAT_METRICS, ENVIRONMENTAL_METRICS, SUPPLEMENTAL_METRICS;
107786
107768
  var init_calculator = __esm(() => {
107787
- init_types5();
107769
+ init_types4();
107788
107770
  init_macrovector_scores();
107789
107771
  BASE_METRICS = [
107790
107772
  "AV",
@@ -107821,7 +107803,7 @@ var init_calculator = __esm(() => {
107821
107803
 
107822
107804
  // src/lib/cvss/index.ts
107823
107805
  var init_cvss = __esm(() => {
107824
- init_types5();
107806
+ init_types4();
107825
107807
  init_calculator();
107826
107808
  init_macrovector_scores();
107827
107809
  });
@@ -107846,8 +107828,7 @@ async function scoreFindingWithCVSS(input, model, authConfig, abortSignal) {
107846
107828
  vectorString: cvssResult.vectorString,
107847
107829
  metrics: cvssResult.metrics,
107848
107830
  scoreType: cvssResult.scoreType,
107849
- reasoning: assessment.reasoning,
107850
- cwes: assessment.cwes
107831
+ reasoning: assessment.reasoning
107851
107832
  };
107852
107833
  }
107853
107834
  function truncateField(value, limit) {
@@ -108031,45 +108012,11 @@ var CVSSMetricsOutputSchema, CVSS_SCORER_SYSTEM_PROMPT = `You are a CVSS 4.0 sco
108031
108012
  6. Assess impact on both the vulnerable system AND potential subsequent systems
108032
108013
  7. Since a POC exists and confirmed the vulnerability, E should typically be 'A'
108033
108014
 
108034
- Always provide brief reasoning explaining your key decisions.
108035
-
108036
- ## CWE Assignment Guidelines
108037
-
108038
- In addition to CVSS metrics, assign one or more CWE identifiers to the finding. For each CWE, provide a brief reasoning explaining why it applies.
108039
-
108040
- ### Common CWE Mappings
108041
-
108042
- | Vulnerability Class | Primary CWE | Related CWEs |
108043
- |---------------------|------------|--------------|
108044
- | SQL Injection | CWE-89 | CWE-564 (Hibernate), CWE-943 (NoSQL) |
108045
- | Cross-Site Scripting (XSS) | CWE-79 | CWE-80 (Basic XSS), CWE-87 (Alt XSS) |
108046
- | Command/OS Injection | CWE-78 | CWE-77 (Command Injection) |
108047
- | Code Injection / RCE | CWE-94 | CWE-95 (Eval Injection), CWE-96 (Static Code Injection) |
108048
- | IDOR / Access Control | CWE-639 | CWE-284 (Improper Access Control), CWE-862 (Missing AuthZ) |
108049
- | SSRF | CWE-918 | — |
108050
- | Path Traversal / LFI | CWE-22 | CWE-23 (Relative Path), CWE-36 (Absolute Path) |
108051
- | XXE | CWE-611 | CWE-776 (Recursive Entity) |
108052
- | SSTI | CWE-1336 | CWE-94 (Code Injection) |
108053
- | CSRF | CWE-352 | — |
108054
- | Deserialization | CWE-502 | — |
108055
- | Open Redirect | CWE-601 | — |
108056
- | Information Disclosure | CWE-200 | CWE-209 (Error Messages), CWE-532 (Log Files) |
108057
- | Authentication Bypass | CWE-287 | CWE-306 (Missing Auth) |
108058
- | Cryptographic Issues | CWE-327 | CWE-328 (Weak Hash), CWE-330 (Insufficient Randomness) |
108059
-
108060
- ### CWE Assignment Rules
108061
-
108062
- 1. Assign the **most specific applicable CWE(s)** — prefer CWE-89 (SQL Injection) over CWE-74 (generic Injection).
108063
- 2. Use the standard \`CWE-<number>\` format (e.g., CWE-89, not "CWE 89" or "89").
108064
- 3. Assign **1-3 CWEs** per finding. Multiple CWEs are appropriate when the vulnerability spans categories (e.g., an IDOR that also leaks PII: CWE-639 + CWE-200).
108065
- 4. Order CWEs by relevance — the primary weakness first.
108066
- 5. When the vulnerability class is provided, use it as a strong hint but verify against the evidence.
108067
- 6. For each CWE, provide a specific reasoning explaining why it applies to *this* finding — not a generic definition of the CWE.`, MAX_EVIDENCE_CHARS = 1e4, MAX_DESCRIPTION_CHARS = 3000, MAX_IMPACT_CHARS = 2000;
108015
+ Always provide brief reasoning explaining your key decisions.`, MAX_EVIDENCE_CHARS = 1e4, MAX_DESCRIPTION_CHARS = 3000, MAX_IMPACT_CHARS = 2000;
108068
108016
  var init_cvssScorer = __esm(() => {
108069
108017
  init_zod();
108070
108018
  init_ai2();
108071
108019
  init_cvss();
108072
- init_types2();
108073
108020
  CVSSMetricsOutputSchema = exports_external.object({
108074
108021
  metrics: exports_external.object({
108075
108022
  AV: exports_external.enum(["N", "A", "L", "P"]).describe("Attack Vector: N=Network (remotely exploitable), A=Adjacent network, L=Local access required, P=Physical access required"),
@@ -108085,8 +108032,7 @@ var init_cvssScorer = __esm(() => {
108085
108032
  SA: exports_external.enum(["H", "L", "N"]).describe("Availability Impact on Subsequent Systems: H=High, L=Low, N=None"),
108086
108033
  E: exports_external.enum(["A", "P", "U"]).describe("Exploit Maturity: A=Attacked (working exploit exists), P=POC available, U=Unreported")
108087
108034
  }),
108088
- reasoning: exports_external.string().describe("Brief explanation (2-3 sentences) of the key factors that influenced the metric choices"),
108089
- cwes: exports_external.array(CweEntrySchema).describe("CWE classifications for this vulnerability, most specific first")
108035
+ reasoning: exports_external.string().describe("Brief explanation (2-3 sentences) of the key factors that influenced the metric choices")
108090
108036
  });
108091
108037
  });
108092
108038
 
@@ -108111,8 +108057,7 @@ FINDING STRUCTURE:
108111
108057
  - Impact: Business and technical consequences if exploited
108112
108058
  - Evidence: Commands run, responses received, proof of exploitation
108113
108059
  - Remediation: Specific, actionable steps to fix
108114
- - References: CVE, CWE, OWASP, or security advisories
108115
- - Vulnerability Class: The class of vulnerability (e.g., sqli, xss, command-injection) — improves CWE accuracy`,
108060
+ - References: CVE, CWE, OWASP, or security advisories`,
108116
108061
  inputSchema: documentVulnerabilityInputSchema,
108117
108062
  execute: async (input) => {
108118
108063
  try {
@@ -108137,8 +108082,7 @@ FINDING STRUCTURE:
108137
108082
  impact: input.impact,
108138
108083
  evidence: evidenceForPrompt,
108139
108084
  endpoint: input.endpoint,
108140
- remediation: input.remediation,
108141
- vulnerabilityClass: input.vulnerabilityClass
108085
+ remediation: input.remediation
108142
108086
  },
108143
108087
  agentMessages: []
108144
108088
  }, ctx4.model, ctx4.authConfig, ctx4.abortSignal);
@@ -108171,7 +108115,6 @@ FINDING STRUCTURE:
108171
108115
  sessionId: session.id,
108172
108116
  target: session.targets[0],
108173
108117
  ...evidenceFilePath && { evidenceFile: evidenceFilePath },
108174
- cwes: cvssResult.cwes,
108175
108118
  cvss: {
108176
108119
  score: cvssResult.score,
108177
108120
  severity: cvssResult.severity,
@@ -108201,10 +108144,6 @@ FINDING STRUCTURE:
108201
108144
  **Score Type:** ${cvssResult.scoreType}
108202
108145
 
108203
108146
  **Reasoning:** ${cvssResult.reasoning}`;
108204
- const cweSection = cvssResult.cwes?.length ? `## CWE Classification
108205
-
108206
- ${cvssResult.cwes.map((cwe) => `- **${cwe.id}** — ${cwe.reasoning}`).join(`
108207
- `)}` : "";
108208
108147
  const evidenceSection = evidenceFilePath ? `## Evidence
108209
108148
 
108210
108149
  \`\`\`
@@ -108236,9 +108175,7 @@ ${finding.impact}
108236
108175
 
108237
108176
  ${cvssSection}
108238
108177
 
108239
- ${cweSection ? `${cweSection}
108240
-
108241
- ` : ""}${evidenceSection}
108178
+ ${evidenceSection}
108242
108179
 
108243
108180
  ## POC
108244
108181
 
@@ -108258,8 +108195,7 @@ ${finding.references}` : ""}
108258
108195
  `;
108259
108196
  writeFileSync7(mdPath, markdown);
108260
108197
  const summaryPath = join11(session.rootPath, "findings-summary.md");
108261
- const cweTag = cvssResult.cwes?.length ? ` (${cvssResult.cwes.map((c) => c.id).join(", ")})` : "";
108262
- const summaryEntry = `- [${finding.severity}] (CVSS ${cvssResult.score})${cweTag} ${finding.title} - \`findings/${mdFilename}\`
108198
+ const summaryEntry = `- [${finding.severity}] (CVSS ${cvssResult.score}) ${finding.title} - \`findings/${mdFilename}\`
108263
108199
  `;
108264
108200
  try {
108265
108201
  appendFileSync2(summaryPath, summaryEntry);
@@ -108312,7 +108248,6 @@ var init_documentFinding = __esm(() => {
108312
108248
  pocPath: exports_external.string().describe("Relative path to the POC script (e.g., pocs/poc_sqli.sh)"),
108313
108249
  remediation: exports_external.string().describe("Steps to fix the issue"),
108314
108250
  references: exports_external.string().optional().describe("CVE, CWE, or related references"),
108315
- vulnerabilityClass: exports_external.string().optional().describe("The class of vulnerability (e.g., sqli, xss, command-injection, idor, ssrf, path-traversal, crypto, cve)"),
108316
108251
  toolCallDescription: exports_external.string().describe("A concise, human-readable description of what this tool call is doing (e.g., 'Documenting SQL injection finding')")
108317
108252
  });
108318
108253
  FALLBACK_CVSS = {
@@ -108334,8 +108269,7 @@ var init_documentFinding = __esm(() => {
108334
108269
  E: "A"
108335
108270
  },
108336
108271
  scoreType: "CVSS-BT",
108337
- reasoning: "CVSS scoring unavailable — using conservative MEDIUM default.",
108338
- cwes: []
108272
+ reasoning: "CVSS scoring unavailable — using conservative MEDIUM default."
108339
108273
  };
108340
108274
  });
108341
108275
 
@@ -110970,7 +110904,7 @@ For each app you identified, spawn a coding agent with a detailed objective. The
110970
110904
 
110971
110905
  // src/core/agents/specialized/whiteboxAttackSurface/types.ts
110972
110906
  var RiskScoreBreakdownSchema, RiskScoreSchema, EndpointSchema, AppSchema, WhiteboxAttackSurfaceResultSchema;
110973
- var init_types6 = __esm(() => {
110907
+ var init_types5 = __esm(() => {
110974
110908
  init_zod();
110975
110909
  RiskScoreBreakdownSchema = exports_external.object({
110976
110910
  exposure: exports_external.number().min(0).max(3).describe("Exposure Level (0-3): 3=Public no auth, 2=Standard user login, 1=Privileged/admin access, 0=Private/internal-only"),
@@ -111044,7 +110978,7 @@ var init_agent2 = __esm(() => {
111044
110978
  init_dist5();
111045
110979
  init_dist5();
111046
110980
  init_offensiveSecurityAgent();
111047
- init_types6();
110981
+ init_types5();
111048
110982
  WhiteboxAttackSurfaceAgent = class WhiteboxAttackSurfaceAgent extends OffensiveSecurityAgent {
111049
110983
  constructor(opts) {
111050
110984
  const {
@@ -193939,7 +193873,7 @@ function createInitialOperatorState(initialMode = "manual", requireApproval = tr
193939
193873
  };
193940
193874
  }
193941
193875
  var OPERATOR_STAGES, OperatorSettingsObject2;
193942
- var init_types7 = __esm(() => {
193876
+ var init_types6 = __esm(() => {
193943
193877
  init_zod();
193944
193878
  OPERATOR_STAGES = {
193945
193879
  setup: {
@@ -194137,11 +194071,11 @@ var init_approvalGate = __esm(() => {
194137
194071
 
194138
194072
  // src/core/operator/stageManager.ts
194139
194073
  var init_stageManager = __esm(() => {
194140
- init_types7();
194074
+ init_types6();
194141
194075
  });
194142
194076
  // src/core/operator/index.ts
194143
194077
  var init_operator = __esm(() => {
194144
- init_types7();
194078
+ init_types6();
194145
194079
  init_toolClassifier();
194146
194080
  init_approvalGate();
194147
194081
  init_stageManager();
@@ -194458,7 +194392,7 @@ var BlackboxAttackSurfaceAgent;
194458
194392
  var init_blackboxAgent = __esm(() => {
194459
194393
  init_dist5();
194460
194394
  init_utils2();
194461
- init_types3();
194395
+ init_types2();
194462
194396
  init_offensiveSecurityAgent();
194463
194397
  BlackboxAttackSurfaceAgent = class BlackboxAttackSurfaceAgent extends OffensiveSecurityAgent {
194464
194398
  constructor(opts) {
@@ -195435,7 +195369,7 @@ When your objective includes structured output, call \`response\` with your fina
195435
195369
  var init_whiteboxAttackSurface = __esm(() => {
195436
195370
  init_zod();
195437
195371
  init_agent3();
195438
- init_types6();
195372
+ init_types5();
195439
195373
  init_riskScoring();
195440
195374
  AppInfoSchema = exports_external.object({
195441
195375
  name: exports_external.string().describe("Application or service name"),
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pensar/apex",
3
- "version": "0.0.90-canary.97fbe7e3",
3
+ "version": "0.0.90",
4
4
  "description": "AI-powered penetration testing CLI tool with terminal UI",
5
5
  "module": "src/tui/index.tsx",
6
6
  "main": "build/index.js",