pentesting 0.73.3 → 0.73.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -120,3 +120,124 @@ we don't stop until the flag is captured.
120
120
  <br/>
121
121
 
122
122
  </div>
123
+
124
+ ---
125
+
126
+ ## Research References
127
+
128
+ This section collects representative papers matched to the design themes reflected in `pentesting`.
129
+
130
+ It is an inference-based reconstruction from topic overlap, not a verbatim personal reading log.
131
+
132
+ ### Mapping
133
+
134
+ - Offensive security agent papers inform the autonomous pentest workflow.
135
+ - Planner-executor and heterogeneous collaboration papers inform task decomposition and coordination.
136
+ - Multi-agent orchestration papers inform role separation, delegation, and control topology.
137
+ - Benchmark and evaluation papers inform capability framing and validation strategy.
138
+
139
+ ### Offensive Security Agents
140
+
141
+ 1. [PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing](https://www.usenix.org/conference/usenixsecurity24/presentation/deng)
142
+ USENIX Security 2024
143
+ Relevance: autonomous pentest loop and operator-assist workflow.
144
+
145
+ 2. [D-CIPHER: Dynamic Collaborative Intelligent Agents with Planning and Heterogeneous Execution for Enhanced Reasoning in Offensive Security](https://arxiv.org/abs/2502.10931)
146
+ arXiv 2025
147
+ Relevance: collaborative offensive agents, planning, and heterogeneous execution roles.
148
+
149
+ 3. [Towards Automated Software Security Testing: Augmenting Penetration Testing through LLMs](https://conf.researchr.org/room/ssbse-2023/fse-2023-venue-golden-gate-c1)
150
+ ESEC/FSE 2023
151
+ Relevance: LLM-augmented penetration testing as a software engineering workflow.
152
+
153
+ 4. [LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks](https://arxiv.org/abs/2310.11409)
154
+ arXiv 2023
155
+ Relevance: offensive autonomy in post-exploitation and privilege escalation.
156
+
157
+ 5. [Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks](https://arxiv.org/abs/2502.04227)
158
+ arXiv 2025
159
+ Relevance: enterprise network movement and AD-focused agent behavior.
160
+
161
+ 6. [LLM Agents can Autonomously Hack Websites](https://arxiv.org/abs/2402.06664)
162
+ arXiv 2024
163
+ Relevance: web exploitation agents and end-to-end task execution.
164
+
165
+ 7. [LLM Agents can Autonomously Exploit One-day Vulnerabilities](https://arxiv.org/abs/2404.08144)
166
+ arXiv 2024
167
+ Relevance: exploit execution against known-vulnerability targets.
168
+
169
+ 8. [Teams of LLM Agents can Exploit Zero-Day Vulnerabilities](https://arxiv.org/abs/2406.01637)
170
+ arXiv 2024
171
+ Relevance: multi-agent offensive workflows for harder vulnerability exploitation.
172
+
173
+ 9. [AutoPentester: An LLM Agent-based Framework for Automated Pentesting](https://arxiv.org/abs/2510.05605)
174
+ arXiv 2025
175
+ Relevance: explicit automated pentesting framework alignment.
176
+
177
+ ### Benchmarks and Cyber Evaluation
178
+
179
+ 10. [AutoPenBench: A Vulnerability Testing Benchmark for Generative Agents](https://aclanthology.org/2025.emnlp-industry.114/)
180
+ EMNLP Industry 2025
181
+ Relevance: benchmark framing for generative vulnerability-testing agents.
182
+
183
+ 11. [Training Language Model Agents to Find Vulnerabilities with CTF-Dojo](https://arxiv.org/abs/2508.18370)
184
+ arXiv 2025
185
+ Relevance: CTF-grounded vulnerability discovery and training/eval setup.
186
+
187
+ 12. [Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risks of Language Models](https://arxiv.org/abs/2408.08926)
188
+ arXiv 2024
189
+ Relevance: evaluation of cybersecurity capability and misuse risk.
190
+
191
+ 13. [CyberGym: Evaluating AI Agents' Cybersecurity Capabilities with Real-World Vulnerabilities at Scale](https://arxiv.org/abs/2506.02548)
192
+ arXiv 2025
193
+ Relevance: large-scale realistic vulnerability evaluation.
194
+
195
+ 14. [CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models](https://arxiv.org/abs/2404.13161)
196
+ arXiv 2024
197
+ Relevance: broad cyber eval framing and safety measurement.
198
+
199
+ 15. [When LLMs Meet Cybersecurity: A Systematic Literature Review](https://arxiv.org/abs/2405.03644)
200
+ arXiv 2024
201
+ Relevance: survey grounding across offensive and defensive use cases.
202
+
203
+ 16. [Large Language Models in Cybersecurity: State-of-the-Art](https://arxiv.org/abs/2402.00891)
204
+ arXiv 2024
205
+ Relevance: landscape overview for positioning the project.
206
+
207
+ ### Multi-Agent Collaboration and Orchestration
208
+
209
+ 17. [A Survey on Large Language Model based Autonomous Agents](https://arxiv.org/abs/2308.11432)
210
+ arXiv 2023
211
+ Relevance: agent architecture baseline and terminology.
212
+
213
+ 18. [Large Language Model based Multi-Agents: A Survey of Progress and Challenges](https://arxiv.org/abs/2402.01680)
214
+ arXiv 2024
215
+ Relevance: multi-agent coordination patterns and failure modes.
216
+
217
+ 19. [AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation](https://arxiv.org/abs/2308.08155)
218
+ arXiv 2023
219
+ Relevance: role-based dialogue and tool-using multi-agent orchestration.
220
+
221
+ 20. [MetaGPT: Meta Programming for A Multi-Agent Collaborative Framework](https://arxiv.org/abs/2308.00352)
222
+ arXiv 2023
223
+ Relevance: structured role decomposition and pipeline-style collaboration.
224
+
225
+ 21. [ChatDev: Communicative Agents for Software Development](https://aclanthology.org/2024.acl-long.810/)
226
+ ACL 2024
227
+ Relevance: communication protocol and software-task role separation.
228
+
229
+ 22. [CAMEL: Communicative Agents for "Mind" Exploration of Large Language Model Society](https://arxiv.org/abs/2303.17760)
230
+ arXiv 2023
231
+ Relevance: agent role prompting and cooperative interaction patterns.
232
+
233
+ 23. [AgentVerse: Facilitating Multi-Agent Collaboration and Exploring Emergent Behaviors](https://arxiv.org/abs/2308.10848)
234
+ arXiv 2023
235
+ Relevance: multi-agent environment framing and emergent collaboration.
236
+
237
+ 24. [Scaling Large-Language-Model-based Multi-Agent Collaboration](https://arxiv.org/abs/2406.07155)
238
+ arXiv 2024
239
+ Relevance: scale behavior and coordination bottlenecks.
240
+
241
+ 25. [Multi-Agent Collaboration via Evolving Orchestration](https://arxiv.org/abs/2505.19591)
242
+ arXiv 2025
243
+ Relevance: orchestration policy evolution and adaptive coordination.
@@ -5,7 +5,7 @@ import {
5
5
  createContextExtractor,
6
6
  getLLMClient,
7
7
  getShellSupervisorLifecycleSnapshot
8
- } from "./chunk-BKWCGMSV.js";
8
+ } from "./chunk-ULP6TF2X.js";
9
9
  import {
10
10
  AGENT_ROLES,
11
11
  EVENT_TYPES,
@@ -13,14 +13,14 @@ import {
13
13
  TOOL_NAMES,
14
14
  getProcessOutput,
15
15
  listBackgroundProcesses
16
- } from "./chunk-UB7RW6LM.js";
16
+ } from "./chunk-EIPVHHPI.js";
17
17
  import {
18
18
  DETECTION_PATTERNS,
19
19
  PROCESS_EVENTS,
20
20
  PROCESS_ROLES,
21
21
  getActiveProcessSummary,
22
22
  getProcessEventLog
23
- } from "./chunk-GLO6TOJN.js";
23
+ } from "./chunk-I52SWXYV.js";
24
24
 
25
25
  // src/engine/agent-tool/completion-box.ts
26
26
  function createCompletionBox() {