pentesting 0.73.3 → 0.73.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +121 -0
- package/dist/{agent-tool-JEFUBDZE.js → agent-tool-6JOB2JB6.js} +3 -3
- package/dist/{chunk-UB7RW6LM.js → chunk-EIPVHHPI.js} +194 -63
- package/dist/chunk-I52SWXYV.js +1122 -0
- package/dist/{chunk-BKWCGMSV.js → chunk-ULP6TF2X.js} +46 -11
- package/dist/main.js +1635 -1005
- package/dist/{persistence-2WKQHGOL.js → persistence-EFKMGPYS.js} +2 -2
- package/dist/{process-registry-QIW7ZIUT.js → process-registry-BI7BKPHN.js} +1 -1
- package/package.json +3 -4
- package/dist/chunk-GLO6TOJN.js +0 -333
package/README.md
CHANGED
|
@@ -120,3 +120,124 @@ we don't stop until the flag is captured.
|
|
|
120
120
|
<br/>
|
|
121
121
|
|
|
122
122
|
</div>
|
|
123
|
+
|
|
124
|
+
---
|
|
125
|
+
|
|
126
|
+
## Research References
|
|
127
|
+
|
|
128
|
+
This section collects representative papers matched to the design themes reflected in `pentesting`.
|
|
129
|
+
|
|
130
|
+
It is an inference-based reconstruction from topic overlap, not a verbatim personal reading log.
|
|
131
|
+
|
|
132
|
+
### Mapping
|
|
133
|
+
|
|
134
|
+
- Offensive security agent papers inform the autonomous pentest workflow.
|
|
135
|
+
- Planner-executor and heterogeneous collaboration papers inform task decomposition and coordination.
|
|
136
|
+
- Multi-agent orchestration papers inform role separation, delegation, and control topology.
|
|
137
|
+
- Benchmark and evaluation papers inform capability framing and validation strategy.
|
|
138
|
+
|
|
139
|
+
### Offensive Security Agents
|
|
140
|
+
|
|
141
|
+
1. [PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing](https://www.usenix.org/conference/usenixsecurity24/presentation/deng)
|
|
142
|
+
USENIX Security 2024
|
|
143
|
+
Relevance: autonomous pentest loop and operator-assist workflow.
|
|
144
|
+
|
|
145
|
+
2. [D-CIPHER: Dynamic Collaborative Intelligent Agents with Planning and Heterogeneous Execution for Enhanced Reasoning in Offensive Security](https://arxiv.org/abs/2502.10931)
|
|
146
|
+
arXiv 2025
|
|
147
|
+
Relevance: collaborative offensive agents, planning, and heterogeneous execution roles.
|
|
148
|
+
|
|
149
|
+
3. [Towards Automated Software Security Testing: Augmenting Penetration Testing through LLMs](https://conf.researchr.org/room/ssbse-2023/fse-2023-venue-golden-gate-c1)
|
|
150
|
+
ESEC/FSE 2023
|
|
151
|
+
Relevance: LLM-augmented penetration testing as a software engineering workflow.
|
|
152
|
+
|
|
153
|
+
4. [LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks](https://arxiv.org/abs/2310.11409)
|
|
154
|
+
arXiv 2023
|
|
155
|
+
Relevance: offensive autonomy in post-exploitation and privilege escalation.
|
|
156
|
+
|
|
157
|
+
5. [Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks](https://arxiv.org/abs/2502.04227)
|
|
158
|
+
arXiv 2025
|
|
159
|
+
Relevance: enterprise network movement and AD-focused agent behavior.
|
|
160
|
+
|
|
161
|
+
6. [LLM Agents can Autonomously Hack Websites](https://arxiv.org/abs/2402.06664)
|
|
162
|
+
arXiv 2024
|
|
163
|
+
Relevance: web exploitation agents and end-to-end task execution.
|
|
164
|
+
|
|
165
|
+
7. [LLM Agents can Autonomously Exploit One-day Vulnerabilities](https://arxiv.org/abs/2404.08144)
|
|
166
|
+
arXiv 2024
|
|
167
|
+
Relevance: exploit execution against known-vulnerability targets.
|
|
168
|
+
|
|
169
|
+
8. [Teams of LLM Agents can Exploit Zero-Day Vulnerabilities](https://arxiv.org/abs/2406.01637)
|
|
170
|
+
arXiv 2024
|
|
171
|
+
Relevance: multi-agent offensive workflows for harder vulnerability exploitation.
|
|
172
|
+
|
|
173
|
+
9. [AutoPentester: An LLM Agent-based Framework for Automated Pentesting](https://arxiv.org/abs/2510.05605)
|
|
174
|
+
arXiv 2025
|
|
175
|
+
Relevance: explicit automated pentesting framework alignment.
|
|
176
|
+
|
|
177
|
+
### Benchmarks and Cyber Evaluation
|
|
178
|
+
|
|
179
|
+
10. [AutoPenBench: A Vulnerability Testing Benchmark for Generative Agents](https://aclanthology.org/2025.emnlp-industry.114/)
|
|
180
|
+
EMNLP Industry 2025
|
|
181
|
+
Relevance: benchmark framing for generative vulnerability-testing agents.
|
|
182
|
+
|
|
183
|
+
11. [Training Language Model Agents to Find Vulnerabilities with CTF-Dojo](https://arxiv.org/abs/2508.18370)
|
|
184
|
+
arXiv 2025
|
|
185
|
+
Relevance: CTF-grounded vulnerability discovery and training/eval setup.
|
|
186
|
+
|
|
187
|
+
12. [Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risks of Language Models](https://arxiv.org/abs/2408.08926)
|
|
188
|
+
arXiv 2024
|
|
189
|
+
Relevance: evaluation of cybersecurity capability and misuse risk.
|
|
190
|
+
|
|
191
|
+
13. [CyberGym: Evaluating AI Agents' Cybersecurity Capabilities with Real-World Vulnerabilities at Scale](https://arxiv.org/abs/2506.02548)
|
|
192
|
+
arXiv 2025
|
|
193
|
+
Relevance: large-scale realistic vulnerability evaluation.
|
|
194
|
+
|
|
195
|
+
14. [CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models](https://arxiv.org/abs/2404.13161)
|
|
196
|
+
arXiv 2024
|
|
197
|
+
Relevance: broad cyber eval framing and safety measurement.
|
|
198
|
+
|
|
199
|
+
15. [When LLMs Meet Cybersecurity: A Systematic Literature Review](https://arxiv.org/abs/2405.03644)
|
|
200
|
+
arXiv 2024
|
|
201
|
+
Relevance: survey grounding across offensive and defensive use cases.
|
|
202
|
+
|
|
203
|
+
16. [Large Language Models in Cybersecurity: State-of-the-Art](https://arxiv.org/abs/2402.00891)
|
|
204
|
+
arXiv 2024
|
|
205
|
+
Relevance: landscape overview for positioning the project.
|
|
206
|
+
|
|
207
|
+
### Multi-Agent Collaboration and Orchestration
|
|
208
|
+
|
|
209
|
+
17. [A Survey on Large Language Model based Autonomous Agents](https://arxiv.org/abs/2308.11432)
|
|
210
|
+
arXiv 2023
|
|
211
|
+
Relevance: agent architecture baseline and terminology.
|
|
212
|
+
|
|
213
|
+
18. [Large Language Model based Multi-Agents: A Survey of Progress and Challenges](https://arxiv.org/abs/2402.01680)
|
|
214
|
+
arXiv 2024
|
|
215
|
+
Relevance: multi-agent coordination patterns and failure modes.
|
|
216
|
+
|
|
217
|
+
19. [AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation](https://arxiv.org/abs/2308.08155)
|
|
218
|
+
arXiv 2023
|
|
219
|
+
Relevance: role-based dialogue and tool-using multi-agent orchestration.
|
|
220
|
+
|
|
221
|
+
20. [MetaGPT: Meta Programming for A Multi-Agent Collaborative Framework](https://arxiv.org/abs/2308.00352)
|
|
222
|
+
arXiv 2023
|
|
223
|
+
Relevance: structured role decomposition and pipeline-style collaboration.
|
|
224
|
+
|
|
225
|
+
21. [ChatDev: Communicative Agents for Software Development](https://aclanthology.org/2024.acl-long.810/)
|
|
226
|
+
ACL 2024
|
|
227
|
+
Relevance: communication protocol and software-task role separation.
|
|
228
|
+
|
|
229
|
+
22. [CAMEL: Communicative Agents for "Mind" Exploration of Large Language Model Society](https://arxiv.org/abs/2303.17760)
|
|
230
|
+
arXiv 2023
|
|
231
|
+
Relevance: agent role prompting and cooperative interaction patterns.
|
|
232
|
+
|
|
233
|
+
23. [AgentVerse: Facilitating Multi-Agent Collaboration and Exploring Emergent Behaviors](https://arxiv.org/abs/2308.10848)
|
|
234
|
+
arXiv 2023
|
|
235
|
+
Relevance: multi-agent environment framing and emergent collaboration.
|
|
236
|
+
|
|
237
|
+
24. [Scaling Large-Language-Model-based Multi-Agent Collaboration](https://arxiv.org/abs/2406.07155)
|
|
238
|
+
arXiv 2024
|
|
239
|
+
Relevance: scale behavior and coordination bottlenecks.
|
|
240
|
+
|
|
241
|
+
25. [Multi-Agent Collaboration via Evolving Orchestration](https://arxiv.org/abs/2505.19591)
|
|
242
|
+
arXiv 2025
|
|
243
|
+
Relevance: orchestration policy evolution and adaptive coordination.
|
|
@@ -5,7 +5,7 @@ import {
|
|
|
5
5
|
createContextExtractor,
|
|
6
6
|
getLLMClient,
|
|
7
7
|
getShellSupervisorLifecycleSnapshot
|
|
8
|
-
} from "./chunk-
|
|
8
|
+
} from "./chunk-ULP6TF2X.js";
|
|
9
9
|
import {
|
|
10
10
|
AGENT_ROLES,
|
|
11
11
|
EVENT_TYPES,
|
|
@@ -13,14 +13,14 @@ import {
|
|
|
13
13
|
TOOL_NAMES,
|
|
14
14
|
getProcessOutput,
|
|
15
15
|
listBackgroundProcesses
|
|
16
|
-
} from "./chunk-
|
|
16
|
+
} from "./chunk-EIPVHHPI.js";
|
|
17
17
|
import {
|
|
18
18
|
DETECTION_PATTERNS,
|
|
19
19
|
PROCESS_EVENTS,
|
|
20
20
|
PROCESS_ROLES,
|
|
21
21
|
getActiveProcessSummary,
|
|
22
22
|
getProcessEventLog
|
|
23
|
-
} from "./chunk-
|
|
23
|
+
} from "./chunk-I52SWXYV.js";
|
|
24
24
|
|
|
25
25
|
// src/engine/agent-tool/completion-box.ts
|
|
26
26
|
function createCompletionBox() {
|