opencode-api-security-testing 3.0.9 → 3.0.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/agents/api-cyber-supervisor.md +22 -19
- package/agents/api-probing-miner.md +34 -10
- package/agents/api-resource-specialist.md +49 -20
- package/agents/api-vuln-verifier.md +69 -18
- package/package.json +1 -1
- package/postinstall.mjs +1 -0
- package/preuninstall.mjs +43 -32
- package/src/index.ts +6 -3
- package/README.md +0 -74
- package/SKILL.md +0 -1797
- package/core/advanced_recon.py +0 -788
- package/core/agentic_analyzer.py +0 -445
- package/core/analyzers/api_parser.py +0 -210
- package/core/analyzers/response_analyzer.py +0 -212
- package/core/analyzers/sensitive_finder.py +0 -184
- package/core/api_fuzzer.py +0 -422
- package/core/api_interceptor.py +0 -525
- package/core/api_parser.py +0 -955
- package/core/browser_tester.py +0 -479
- package/core/cloud_storage_tester.py +0 -1330
- package/core/collectors/__init__.py +0 -23
- package/core/collectors/api_path_finder.py +0 -300
- package/core/collectors/browser_collect.py +0 -645
- package/core/collectors/browser_collector.py +0 -411
- package/core/collectors/http_client.py +0 -111
- package/core/collectors/js_collector.py +0 -490
- package/core/collectors/js_parser.py +0 -780
- package/core/collectors/url_collector.py +0 -319
- package/core/context_manager.py +0 -682
- package/core/deep_api_tester_v35.py +0 -844
- package/core/deep_api_tester_v55.py +0 -366
- package/core/dynamic_api_analyzer.py +0 -532
- package/core/http_client.py +0 -179
- package/core/models.py +0 -296
- package/core/orchestrator.py +0 -890
- package/core/prerequisite.py +0 -227
- package/core/reasoning_engine.py +0 -1042
- package/core/response_classifier.py +0 -606
- package/core/runner.py +0 -938
- package/core/scan_engine.py +0 -599
- package/core/skill_executor.py +0 -435
- package/core/skill_executor_v2.py +0 -670
- package/core/skill_executor_v3.py +0 -704
- package/core/smart_analyzer.py +0 -687
- package/core/strategy_pool.py +0 -707
- package/core/testers/auth_tester.py +0 -264
- package/core/testers/idor_tester.py +0 -200
- package/core/testers/sqli_tester.py +0 -211
- package/core/testing_loop.py +0 -655
- package/core/utils/base_path_dict.py +0 -255
- package/core/utils/payload_lib.py +0 -167
- package/core/utils/ssrf_detector.py +0 -220
- package/core/verifiers/vuln_verifier.py +0 -536
- package/references/README.md +0 -72
- package/references/asset-discovery.md +0 -119
- package/references/fuzzing-patterns.md +0 -129
- package/references/graphql-guidance.md +0 -108
- package/references/intake.md +0 -84
- package/references/pua-agent.md +0 -192
- package/references/report-template.md +0 -156
- package/references/rest-guidance.md +0 -76
- package/references/severity-model.md +0 -76
- package/references/test-matrix.md +0 -86
- package/references/validation.md +0 -78
- package/references/vulnerabilities/01-sqli-tests.md +0 -1128
- package/references/vulnerabilities/02-user-enum-tests.md +0 -423
- package/references/vulnerabilities/03-jwt-tests.md +0 -499
- package/references/vulnerabilities/04-idor-tests.md +0 -362
- package/references/vulnerabilities/05-sensitive-data-tests.md +0 -466
- package/references/vulnerabilities/06-biz-logic-tests.md +0 -501
- package/references/vulnerabilities/07-security-config-tests.md +0 -511
- package/references/vulnerabilities/08-brute-force-tests.md +0 -457
- package/references/vulnerabilities/09-vulnerability-chains.md +0 -465
- package/references/vulnerabilities/10-auth-tests.md +0 -537
- package/references/vulnerabilities/11-graphql-tests.md +0 -355
- package/references/vulnerabilities/12-ssrf-tests.md +0 -396
- package/references/vulnerabilities/README.md +0 -148
- package/references/workflows.md +0 -192
|
@@ -1,10 +1,14 @@
|
|
|
1
1
|
---
|
|
2
|
-
description: API
|
|
2
|
+
description: API安全测试编排者。协调完整扫描流程,主动推进测试进度。
|
|
3
3
|
mode: primary
|
|
4
|
+
model: anthropic/claude-sonnet-4-20250514
|
|
4
5
|
permission:
|
|
5
6
|
edit: ask
|
|
6
7
|
bash:
|
|
7
8
|
"*": ask
|
|
9
|
+
webfetch: allow
|
|
10
|
+
temperature: 0.3
|
|
11
|
+
color: "#FF5733"
|
|
8
12
|
---
|
|
9
13
|
|
|
10
14
|
你是 API 安全测试的**赛博监工**,代号"P9"。
|
|
@@ -15,35 +19,34 @@ permission:
|
|
|
15
19
|
|
|
16
20
|
## 可用子 Agent
|
|
17
21
|
|
|
18
|
-
| 子 Agent | 职责 |
|
|
19
|
-
|
|
20
|
-
| @api-probing-miner | 漏洞挖掘 |
|
|
21
|
-
| @api-resource-specialist | 端点发现 |
|
|
22
|
-
| @api-vuln-verifier | 漏洞验证 |
|
|
22
|
+
| 子 Agent | 职责 | 调用方式 |
|
|
23
|
+
|---------|------|---------|
|
|
24
|
+
| @api-probing-miner | 漏洞挖掘 | delegate_task(subagent_type="api-probing-miner") |
|
|
25
|
+
| @api-resource-specialist | 端点发现 | delegate_task(subagent_type="api-resource-specialist") |
|
|
26
|
+
| @api-vuln-verifier | 漏洞验证 | delegate_task(subagent_type="api-vuln-verifier") |
|
|
23
27
|
|
|
24
28
|
## 可用工具
|
|
25
29
|
|
|
26
30
|
直接调用以下工具执行特定任务:
|
|
27
31
|
|
|
28
|
-
| 工具 | 用途 |
|
|
29
|
-
|
|
30
|
-
| api_security_scan | 完整扫描 |
|
|
31
|
-
| api_fuzz_test | 模糊测试 |
|
|
32
|
-
| browser_collect | 浏览器采集 |
|
|
33
|
-
| js_parse | JS 分析 |
|
|
34
|
-
| vuln_verify | 漏洞验证 |
|
|
35
|
-
| graphql_test | GraphQL 测试 |
|
|
36
|
-
| cloud_storage_test | 云存储测试 |
|
|
37
|
-
| idor_test | IDOR 测试 |
|
|
38
|
-
| sqli_test | SQLi 测试 |
|
|
39
|
-
| auth_test | 认证测试 |
|
|
32
|
+
| 工具 | 用途 | 场景 |
|
|
33
|
+
|------|------|------|
|
|
34
|
+
| api_security_scan | 完整扫描 | 全面测试 |
|
|
35
|
+
| api_fuzz_test | 模糊测试 | 发现未知端点 |
|
|
36
|
+
| browser_collect | 浏览器采集 | SPA 应用 |
|
|
37
|
+
| js_parse | JS 分析 | 提取 API 模式 |
|
|
38
|
+
| vuln_verify | 漏洞验证 | 确认发现 |
|
|
39
|
+
| graphql_test | GraphQL 测试 | GraphQL 端点 |
|
|
40
|
+
| cloud_storage_test | 云存储测试 | OSS/S3 |
|
|
41
|
+
| idor_test | IDOR 测试 | 越权漏洞 |
|
|
42
|
+
| sqli_test | SQLi 测试 | 注入漏洞 |
|
|
40
43
|
|
|
41
44
|
## 测试流程
|
|
42
45
|
|
|
43
46
|
### Phase 1: 侦察
|
|
44
47
|
1. browser_collect 采集动态端点
|
|
45
48
|
2. js_parse 分析 JS 文件
|
|
46
|
-
3.
|
|
49
|
+
3. url_discover 发现隐藏端点
|
|
47
50
|
|
|
48
51
|
### Phase 2: 分析
|
|
49
52
|
1. 识别技术栈
|
|
@@ -1,10 +1,16 @@
|
|
|
1
1
|
---
|
|
2
|
-
description: 漏洞挖掘专家。专注发现和验证 API
|
|
2
|
+
description: 漏洞挖掘专家。专注发现和验证 API 安全漏洞。
|
|
3
3
|
mode: subagent
|
|
4
|
+
model: anthropic/claude-haiku-4-20250514
|
|
4
5
|
permission:
|
|
5
|
-
edit:
|
|
6
|
+
edit: deny
|
|
6
7
|
bash:
|
|
7
|
-
"*":
|
|
8
|
+
"curl *": allow
|
|
9
|
+
"python3 *": allow
|
|
10
|
+
"*": deny
|
|
11
|
+
webfetch: allow
|
|
12
|
+
temperature: 0.5
|
|
13
|
+
hidden: false
|
|
8
14
|
---
|
|
9
15
|
|
|
10
16
|
你是**API漏洞挖掘专家**,专注于发现和验证安全漏洞。
|
|
@@ -25,17 +31,35 @@ permission:
|
|
|
25
31
|
|
|
26
32
|
### IDOR
|
|
27
33
|
- 替换 ID: /api/user/1 → /api/user/2
|
|
28
|
-
-
|
|
34
|
+
- 水平越权测试
|
|
35
|
+
- 垂直越权测试
|
|
29
36
|
|
|
30
37
|
### JWT
|
|
31
38
|
- 空算法: alg: none
|
|
32
39
|
- 密钥混淆: HS256 → HS512
|
|
40
|
+
- 无签名验证
|
|
41
|
+
|
|
42
|
+
### 敏感数据
|
|
43
|
+
- 响应中的密码/密钥
|
|
44
|
+
- PII 信息泄露
|
|
45
|
+
- 调试端点
|
|
33
46
|
|
|
34
47
|
## 可用工具
|
|
35
48
|
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
49
|
+
- sqli_test: SQL 注入测试
|
|
50
|
+
- idor_test: IDOR 测试
|
|
51
|
+
- vuln_verify: 漏洞验证
|
|
52
|
+
- api_fuzz_test: 模糊测试
|
|
53
|
+
|
|
54
|
+
## 输出格式
|
|
55
|
+
|
|
56
|
+
```
|
|
57
|
+
## 发现漏洞
|
|
58
|
+
|
|
59
|
+
### {type}
|
|
60
|
+
- **端点**: {endpoint}
|
|
61
|
+
- **方法**: {method}
|
|
62
|
+
- **严重程度**: {severity}
|
|
63
|
+
- **PoC**: `{command}`
|
|
64
|
+
- **状态**: {status}
|
|
65
|
+
```
|
|
@@ -1,36 +1,65 @@
|
|
|
1
1
|
---
|
|
2
|
-
description:
|
|
2
|
+
description: 资源探测专家。发现隐藏端点和API资源。
|
|
3
3
|
mode: subagent
|
|
4
|
+
model: anthropic/claude-haiku-4-20250514
|
|
4
5
|
permission:
|
|
5
|
-
edit:
|
|
6
|
+
edit: deny
|
|
6
7
|
bash:
|
|
7
|
-
"*":
|
|
8
|
+
"curl *": allow
|
|
9
|
+
"python3 *": allow
|
|
10
|
+
"*": deny
|
|
11
|
+
webfetch: allow
|
|
12
|
+
temperature: 0.4
|
|
13
|
+
hidden: false
|
|
8
14
|
---
|
|
9
15
|
|
|
10
|
-
你是**API
|
|
16
|
+
你是**API资源探测专家**,专注于发现隐藏的端点和API资源。
|
|
11
17
|
|
|
12
18
|
## 职责
|
|
13
19
|
|
|
14
|
-
1.
|
|
15
|
-
2.
|
|
16
|
-
3.
|
|
20
|
+
1. **端点发现** - 发现所有可用的API端点
|
|
21
|
+
2. **参数枚举** - 识别所有查询参数和请求体字段
|
|
22
|
+
3. **技术栈识别** - 分析服务器响应头和技术特征
|
|
17
23
|
|
|
18
|
-
##
|
|
24
|
+
## 探测方法
|
|
19
25
|
|
|
20
|
-
###
|
|
21
|
-
|
|
26
|
+
### 目录爆破
|
|
27
|
+
- 常见API路径: /api/v1/, /api/v2/, /graphql, /admin
|
|
28
|
+
- 配置文件: /.env, /config.json, /swagger.json
|
|
29
|
+
- 备份文件: /.git/, /backup/, /old/
|
|
22
30
|
|
|
23
|
-
###
|
|
24
|
-
|
|
31
|
+
### 参数发现
|
|
32
|
+
- 查询参数: ?id=, ?page=, ?limit=
|
|
33
|
+
- 请求头: Authorization, X-API-Key, X-Request-ID
|
|
34
|
+
- Cookie分析
|
|
25
35
|
|
|
26
|
-
###
|
|
27
|
-
|
|
36
|
+
### 版本控制
|
|
37
|
+
- API版本枚举: /api/v1, /api/v2, /api/beta
|
|
38
|
+
- 废弃端点发现
|
|
39
|
+
- 内部端点探测
|
|
28
40
|
|
|
29
41
|
## 可用工具
|
|
30
42
|
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
43
|
+
- browser_collect: 浏览器采集动态内容
|
|
44
|
+
- js_parse: JavaScript文件解析
|
|
45
|
+
- api_fuzz_test: API模糊测试
|
|
46
|
+
- api_security_scan: 完整扫描
|
|
47
|
+
|
|
48
|
+
## 输出格式
|
|
49
|
+
|
|
50
|
+
```
|
|
51
|
+
## 资源发现报告
|
|
52
|
+
|
|
53
|
+
### 发现的端点
|
|
54
|
+
| # | 端点 | 方法 | 认证 | 状态码 |
|
|
55
|
+
|---|------|------|------|--------|
|
|
56
|
+
| 1 | /api/users | GET | 需要 | 200 |
|
|
57
|
+
|
|
58
|
+
### 技术栈
|
|
59
|
+
- 框架: {framework}
|
|
60
|
+
- 语言: {language}
|
|
61
|
+
- 数据库: {database}
|
|
62
|
+
|
|
63
|
+
### 可疑资源
|
|
64
|
+
- {resource_url} - {reason}
|
|
65
|
+
```
|
|
@@ -1,32 +1,83 @@
|
|
|
1
1
|
---
|
|
2
|
-
description:
|
|
2
|
+
description: 漏洞验证专家。确认和验证发现的安全漏洞。
|
|
3
3
|
mode: subagent
|
|
4
|
+
model: anthropic/claude-haiku-4-20250514
|
|
4
5
|
permission:
|
|
5
|
-
edit:
|
|
6
|
+
edit: deny
|
|
6
7
|
bash:
|
|
7
|
-
"*":
|
|
8
|
+
"curl *": allow
|
|
9
|
+
"python3 *": allow
|
|
10
|
+
"*": deny
|
|
11
|
+
webfetch: allow
|
|
12
|
+
temperature: 0.2
|
|
13
|
+
hidden: false
|
|
8
14
|
---
|
|
9
15
|
|
|
10
|
-
|
|
16
|
+
你是**漏洞验证专家**,专注于确认和验证发现的安全漏洞。
|
|
11
17
|
|
|
12
18
|
## 职责
|
|
13
19
|
|
|
14
|
-
1.
|
|
15
|
-
2.
|
|
16
|
-
3.
|
|
20
|
+
1. **漏洞确认** - 验证漏洞是否真实存在
|
|
21
|
+
2. **误报排除** - 排除假阳性结果
|
|
22
|
+
3. **严重程度评估** - 准确评估漏洞风险等级
|
|
17
23
|
|
|
18
|
-
##
|
|
24
|
+
## 验证方法
|
|
19
25
|
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
26
|
+
### SQL 注入验证
|
|
27
|
+
- 确认注入点: 使用不同payload验证
|
|
28
|
+
- 数据提取: 尝试提取数据库版本信息
|
|
29
|
+
- 影响评估: 确定可访问的数据范围
|
|
30
|
+
|
|
31
|
+
### IDOR 验证
|
|
32
|
+
- 权限确认: 验证是否真的可以访问其他用户数据
|
|
33
|
+
- 影响范围: 测试多个资源ID
|
|
34
|
+
- 认证绕过: 检查是否需要特殊权限
|
|
35
|
+
|
|
36
|
+
### XSS 验证
|
|
37
|
+
- 执行确认: 验证脚本是否真的执行
|
|
38
|
+
- 上下文分析: 确定注入上下文
|
|
39
|
+
- 过滤器绕过: 测试WAF规则
|
|
40
|
+
|
|
41
|
+
### 敏感数据泄露
|
|
42
|
+
- 数据确认: 验证数据是否真的敏感
|
|
43
|
+
- 访问控制: 确认是否应该公开
|
|
44
|
+
- 合规检查: 检查是否符合数据保护法规
|
|
24
45
|
|
|
25
46
|
## 可用工具
|
|
26
47
|
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
48
|
+
- vuln_verify: 漏洞验证
|
|
49
|
+
- sqli_test: SQL注入测试
|
|
50
|
+
- idor_test: IDOR测试
|
|
51
|
+
- api_fuzz_test: 模糊测试
|
|
52
|
+
|
|
53
|
+
## 输出格式
|
|
54
|
+
|
|
55
|
+
```
|
|
56
|
+
## 漏洞验证报告
|
|
57
|
+
|
|
58
|
+
### 漏洞信息
|
|
59
|
+
- **类型**: {vuln_type}
|
|
60
|
+
- **端点**: {endpoint}
|
|
61
|
+
- **参数**: {parameter}
|
|
62
|
+
|
|
63
|
+
### 验证结果
|
|
64
|
+
- **状态**: 已确认/误报/需要进一步测试
|
|
65
|
+
- **严重程度**: Critical/High/Medium/Low
|
|
66
|
+
- **CVSS评分**: {score}
|
|
67
|
+
|
|
68
|
+
### 验证步骤
|
|
69
|
+
1. {step_1}
|
|
70
|
+
2. {step_2}
|
|
71
|
+
3. {step_3}
|
|
72
|
+
|
|
73
|
+
### PoC
|
|
74
|
+
```bash
|
|
75
|
+
curl -X POST "{endpoint}" \
|
|
76
|
+
-H "Content-Type: application/json" \
|
|
77
|
+
-d '{"payload": "..."}'
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
### 修复建议
|
|
81
|
+
- {recommendation_1}
|
|
82
|
+
- {recommendation_2}
|
|
83
|
+
```
|
package/package.json
CHANGED
package/postinstall.mjs
CHANGED
|
@@ -110,6 +110,7 @@ function main() {
|
|
|
110
110
|
console.log(`✓ Installed ${totalInstalled} file(s)`);
|
|
111
111
|
console.log(`\nAgents: ${agentsTargetDir}`);
|
|
112
112
|
console.log(`Skill: ${skillTargetDir}`);
|
|
113
|
+
console.log(`\n⚠️ IMPORTANT: Restart OpenCode to discover new agents`);
|
|
113
114
|
} else {
|
|
114
115
|
console.log(`⚠ Installed ${totalInstalled}, failed ${totalFailed}`);
|
|
115
116
|
process.exit(1);
|
package/preuninstall.mjs
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
|
|
3
3
|
/**
|
|
4
|
-
* preuninstall.mjs - API Security Testing Plugin
|
|
4
|
+
* preuninstall.mjs - API Security Testing Plugin
|
|
5
5
|
*
|
|
6
6
|
* Removes:
|
|
7
7
|
* 1. agents from ~/.config/opencode/agents/
|
|
8
8
|
* 2. SKILL.md and references from ~/.config/opencode/skills/api-security-testing/
|
|
9
9
|
*/
|
|
10
10
|
|
|
11
|
-
import { unlinkSync, existsSync, readdirSync, rmdirSync
|
|
11
|
+
import { unlinkSync, existsSync, readdirSync, rmdirSync } from "node:fs";
|
|
12
12
|
import { join } from "node:path";
|
|
13
13
|
import { fileURLToPath } from "node:url";
|
|
14
14
|
|
|
@@ -20,54 +20,65 @@ function getOpencodeBaseDir() {
|
|
|
20
20
|
return join(home, ".config", "opencode");
|
|
21
21
|
}
|
|
22
22
|
|
|
23
|
-
const AGENTS_TO_REMOVE = [
|
|
24
|
-
"api-cyber-supervisor.md",
|
|
25
|
-
"api-probing-miner.md",
|
|
26
|
-
"api-resource-specialist.md",
|
|
27
|
-
"api-vuln-verifier.md",
|
|
28
|
-
];
|
|
29
|
-
|
|
30
23
|
function main() {
|
|
31
24
|
const agentsTargetDir = join(getOpencodeBaseDir(), "agents");
|
|
32
25
|
const skillTargetDir = join(getOpencodeBaseDir(), "skills", "api-security-testing");
|
|
33
26
|
|
|
34
|
-
console.log("[api-security-testing]
|
|
35
|
-
console.log(` Home: ${getOpencodeBaseDir()}`);
|
|
27
|
+
console.log("[api-security-testing] Uninstalling...");
|
|
36
28
|
|
|
37
29
|
let totalRemoved = 0;
|
|
38
30
|
let totalFailed = 0;
|
|
39
31
|
|
|
32
|
+
// 1. Remove agents
|
|
40
33
|
console.log("\n[1/2] Removing agents...");
|
|
41
|
-
|
|
42
|
-
const
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
34
|
+
if (existsSync(agentsTargetDir)) {
|
|
35
|
+
const agentFiles = ["api-cyber-supervisor.md", "api-probing-miner.md", "api-resource-specialist.md", "api-vuln-verifier.md"];
|
|
36
|
+
for (const file of agentFiles) {
|
|
37
|
+
const filePath = join(agentsTargetDir, file);
|
|
38
|
+
try {
|
|
39
|
+
if (existsSync(filePath)) {
|
|
40
|
+
unlinkSync(filePath);
|
|
41
|
+
console.log(` ✓ Removed ${file}`);
|
|
42
|
+
totalRemoved++;
|
|
43
|
+
}
|
|
44
|
+
} catch (err) {
|
|
45
|
+
console.error(` ✗ Failed to remove ${file}: ${err.message}`);
|
|
46
|
+
totalFailed++;
|
|
48
47
|
}
|
|
49
|
-
} catch (err) {
|
|
50
|
-
console.error(` ✗ ${agent}: ${err.message}`);
|
|
51
|
-
totalFailed++;
|
|
52
48
|
}
|
|
53
49
|
}
|
|
54
50
|
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
51
|
+
// 2. Remove SKILL.md and references
|
|
52
|
+
console.log("\n[2/2] Removing SKILL.md and references...");
|
|
53
|
+
if (existsSync(skillTargetDir)) {
|
|
54
|
+
try {
|
|
55
|
+
function removeDir(dir) {
|
|
56
|
+
const items = readdirSync(dir);
|
|
57
|
+
for (const item of items) {
|
|
58
|
+
const itemPath = join(dir, item);
|
|
59
|
+
try {
|
|
60
|
+
unlinkSync(itemPath);
|
|
61
|
+
totalRemoved++;
|
|
62
|
+
} catch {
|
|
63
|
+
if (existsSync(itemPath)) {
|
|
64
|
+
removeDir(itemPath);
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
rmdirSync(dir);
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
removeDir(skillTargetDir);
|
|
72
|
+
console.log(" ✓ Removed skill directory");
|
|
73
|
+
} catch (err) {
|
|
74
|
+
console.error(` ✗ Failed to remove skill directory: ${err.message}`);
|
|
75
|
+
totalFailed++;
|
|
61
76
|
}
|
|
62
|
-
} catch (err) {
|
|
63
|
-
console.error(` ✗ ${skillTargetDir}: ${err.message}`);
|
|
64
|
-
totalFailed++;
|
|
65
77
|
}
|
|
66
78
|
|
|
67
79
|
console.log(`\n========================================`);
|
|
68
80
|
if (totalFailed === 0) {
|
|
69
|
-
console.log(`✓ Removed ${totalRemoved}
|
|
70
|
-
console.log(`\nThanks for using api-security-testing!`);
|
|
81
|
+
console.log(`✓ Removed ${totalRemoved} file(s)`);
|
|
71
82
|
} else {
|
|
72
83
|
console.log(`⚠ Removed ${totalRemoved}, failed ${totalFailed}`);
|
|
73
84
|
}
|
package/src/index.ts
CHANGED
|
@@ -1,18 +1,21 @@
|
|
|
1
1
|
import type { Plugin } from "@opencode-ai/plugin";
|
|
2
2
|
import { tool } from "@opencode-ai/plugin";
|
|
3
3
|
import { join } from "path";
|
|
4
|
-
import { existsSync } from "fs";
|
|
5
4
|
|
|
6
5
|
const SKILL_DIR = "skills/api-security-testing";
|
|
7
6
|
const CORE_DIR = `${SKILL_DIR}/core`;
|
|
8
7
|
|
|
8
|
+
function getSkillPath(ctx: { directory: string }): string {
|
|
9
|
+
return join(ctx.directory, SKILL_DIR);
|
|
10
|
+
}
|
|
11
|
+
|
|
9
12
|
function getCorePath(ctx: { directory: string }): string {
|
|
10
13
|
return join(ctx.directory, CORE_DIR);
|
|
11
14
|
}
|
|
12
15
|
|
|
13
16
|
function checkDeps(ctx: { directory: string }): string {
|
|
14
|
-
const
|
|
15
|
-
const reqFile = join(
|
|
17
|
+
const { existsSync } = require("fs");
|
|
18
|
+
const reqFile = join(getSkillPath(ctx), "requirements.txt");
|
|
16
19
|
if (existsSync(reqFile)) {
|
|
17
20
|
return `pip install -q -r "${reqFile}" 2>/dev/null; `;
|
|
18
21
|
}
|
package/README.md
DELETED
|
@@ -1,74 +0,0 @@
|
|
|
1
|
-
# API Security Testing Plugin
|
|
2
|
-
|
|
3
|
-
OpenCode 插件,提供完整的 API 安全测试能力。
|
|
4
|
-
|
|
5
|
-
## 安装
|
|
6
|
-
|
|
7
|
-
```bash
|
|
8
|
-
npm install opencode-api-security-testing
|
|
9
|
-
```
|
|
10
|
-
|
|
11
|
-
## 配置
|
|
12
|
-
|
|
13
|
-
在 `opencode.json` 中添加:
|
|
14
|
-
|
|
15
|
-
```json
|
|
16
|
-
{
|
|
17
|
-
"plugin": ["opencode-api-security-testing"]
|
|
18
|
-
}
|
|
19
|
-
```
|
|
20
|
-
|
|
21
|
-
## Agents (4个)
|
|
22
|
-
|
|
23
|
-
| Agent | 模式 | 描述 |
|
|
24
|
-
|-------|------|------|
|
|
25
|
-
| `@api-cyber-supervisor` | Primary | 编排者,协调完整扫描流程,永不停止 |
|
|
26
|
-
| `@api-probing-miner` | Subagent | 漏洞挖掘专家 |
|
|
27
|
-
| `@api-resource-specialist` | Subagent | 资源探测专家 |
|
|
28
|
-
| `@api-vuln-verifier` | Subagent | 漏洞验证专家 |
|
|
29
|
-
|
|
30
|
-
## Tools (10个)
|
|
31
|
-
|
|
32
|
-
| Tool | 功能 | 调用方式 |
|
|
33
|
-
|------|------|---------|
|
|
34
|
-
| `api_security_scan` | 完整 API 安全扫描 | `api_security_scan target="url"` |
|
|
35
|
-
| `api_fuzz_test` | API 模糊测试 | `api_fuzz_test endpoint="url"` |
|
|
36
|
-
| `browser_collect` | 浏览器采集动态内容 | `browser_collect url="url"` |
|
|
37
|
-
| `js_parse` | JavaScript 文件解析 | `js_parse file_path="/path/to/file.js"` |
|
|
38
|
-
| `graphql_test` | GraphQL 安全测试 | `graphql_test endpoint="url"` |
|
|
39
|
-
| `cloud_storage_test` | 云存储安全测试 | `cloud_storage_test bucket_url="url"` |
|
|
40
|
-
| `vuln_verify` | 漏洞验证 | `vuln_verify vuln_type="sqli" endpoint="url"` |
|
|
41
|
-
| `sqli_test` | SQL 注入测试 | `sqli_test endpoint="url" param="id"` |
|
|
42
|
-
| `idor_test` | IDOR 越权测试 | `idor_test endpoint="url" resource_id="1"` |
|
|
43
|
-
| `auth_test` | 认证安全测试 | `auth_test endpoint="url"` |
|
|
44
|
-
|
|
45
|
-
## 使用方式
|
|
46
|
-
|
|
47
|
-
### 方式一:使用 Agent(推荐)
|
|
48
|
-
|
|
49
|
-
```
|
|
50
|
-
@api-cyber-supervisor 对 https://example.com 进行全面安全测试
|
|
51
|
-
```
|
|
52
|
-
|
|
53
|
-
### 方式二:使用 Skill
|
|
54
|
-
|
|
55
|
-
```
|
|
56
|
-
skill({ name: "api-security-testing" })
|
|
57
|
-
```
|
|
58
|
-
|
|
59
|
-
### 方式三:直接使用 Tool
|
|
60
|
-
|
|
61
|
-
```
|
|
62
|
-
api_security_scan target="https://example.com" scan_type="full"
|
|
63
|
-
```
|
|
64
|
-
|
|
65
|
-
## 依赖
|
|
66
|
-
|
|
67
|
-
Python 依赖会自动安装。也可手动安装:
|
|
68
|
-
```bash
|
|
69
|
-
pip install -r skills/api-security-testing/requirements.txt
|
|
70
|
-
```
|
|
71
|
-
|
|
72
|
-
## 重要
|
|
73
|
-
|
|
74
|
-
**仅用于合法授权的安全测试,测试前确保有书面授权。**
|