pentesting 0.73.4 → 0.73.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -38,6 +38,18 @@ Pentesting support tool. Can autonomously execute network penetration tests or a
38
38
 
39
39
  Web search is included in the subscription — **no separate Search API key required**.
40
40
 
41
+ If you want the repository default start path, export your env vars locally and run:
42
+
43
+ ```bash
44
+ export PENTEST_API_KEY="your_z_ai_key"
45
+ export PENTEST_BASE_URL="https://api.z.ai/api/anthropic"
46
+ export PENTEST_MODEL="glm-4.7"
47
+ npm run start
48
+ ```
49
+
50
+ `npm run start -- -t 10.10.10.5` passes CLI arguments through to the container entrypoint.
51
+ Use `npm run start:local` only if you explicitly want the non-container Node runtime.
52
+
41
53
  ```bash
42
54
  docker run -it --rm \
43
55
  -e PENTEST_API_KEY="your_z_ai_key" \
@@ -94,8 +106,10 @@ npm run verify
94
106
  npm run verify:docker
95
107
  ```
96
108
 
97
- - `npm run check` runs the full non-destructive verification flow.
98
- - `npm run check:clean` additionally performs `docker system prune -af --volumes` before the full check.
109
+ - `npm run verify` now runs typecheck, tests, and build.
110
+ - `npm run verify:docker` builds the image and launches the Docker TUI path through `test.sh`.
111
+ - `npm run check` prunes Docker state, runs tests and build, rebuilds the local image, and then launches the Docker TUI path.
112
+ - `npm run check:clean` runs `npm run check:ci` after an explicit `docker system prune -af --volumes`.
99
113
 
100
114
  ---
101
115
 
@@ -5,7 +5,7 @@ import {
5
5
  createContextExtractor,
6
6
  getLLMClient,
7
7
  getShellSupervisorLifecycleSnapshot
8
- } from "./chunk-3KWJPPYB.js";
8
+ } from "./chunk-HSZZHAGX.js";
9
9
  import {
10
10
  AGENT_ROLES,
11
11
  EVENT_TYPES,
@@ -13,14 +13,14 @@ import {
13
13
  TOOL_NAMES,
14
14
  getProcessOutput,
15
15
  listBackgroundProcesses
16
- } from "./chunk-7E2VUIFU.js";
16
+ } from "./chunk-4HG57VDC.js";
17
17
  import {
18
18
  DETECTION_PATTERNS,
19
19
  PROCESS_EVENTS,
20
20
  PROCESS_ROLES,
21
21
  getActiveProcessSummary,
22
22
  getProcessEventLog
23
- } from "./chunk-I52SWXYV.js";
23
+ } from "./chunk-KAUE3MSR.js";
24
24
 
25
25
  // src/engine/agent-tool/completion-box.ts
26
26
  function createCompletionBox() {
@@ -19,7 +19,7 @@ import {
19
19
  getRuntimeSectionOr,
20
20
  logEvent,
21
21
  setProcess
22
- } from "./chunk-I52SWXYV.js";
22
+ } from "./chunk-KAUE3MSR.js";
23
23
 
24
24
  // src/shared/constants/time/conversions.ts
25
25
  var MS_PER_MINUTE = 6e4;
@@ -347,8 +347,7 @@ var INPUT_PROMPT_PATTERNS = [
347
347
  ];
348
348
 
349
349
  // src/shared/constants/agent.ts
350
- var APP_NAME = "Pentest AI";
351
- var APP_VERSION = "0.73.4";
350
+ var APP_VERSION = "0.73.6";
352
351
  var APP_DESCRIPTION = "Autonomous Penetration Testing AI Agent";
353
352
  var LLM_ROLES = {
354
353
  SYSTEM: "system",
@@ -2799,7 +2798,7 @@ async function cleanupAllProcesses() {
2799
2798
  cleanupDone = false;
2800
2799
  return;
2801
2800
  }
2802
- const { getBackgroundProcessesMap: getBackgroundProcessesMap2 } = await import("./process-registry-BI7BKPHN.js");
2801
+ const { getBackgroundProcessesMap: getBackgroundProcessesMap2 } = await import("./process-registry-7XV46TDC.js");
2803
2802
  const backgroundProcesses = getBackgroundProcessesMap2();
2804
2803
  terminateAllNatively(backgroundProcesses, "SIGTERM");
2805
2804
  await new Promise((r) => setTimeout(r, SYSTEM_LIMITS.CLEANUP_BATCH_WAIT_MS));
@@ -4132,7 +4131,6 @@ export {
4132
4131
  LLM_ERROR_TYPES,
4133
4132
  AGENT_LIMITS,
4134
4133
  MEMORY_LIMITS,
4135
- APP_NAME,
4136
4134
  APP_VERSION,
4137
4135
  APP_DESCRIPTION,
4138
4136
  LLM_ROLES,
@@ -64,7 +64,7 @@ import {
64
64
  startBackgroundProcess,
65
65
  stopBackgroundProcess,
66
66
  writeFileContent
67
- } from "./chunk-7E2VUIFU.js";
67
+ } from "./chunk-4HG57VDC.js";
68
68
  import {
69
69
  DETECTION_PATTERNS,
70
70
  HEALTH_CONFIG,
@@ -78,7 +78,7 @@ import {
78
78
  __require,
79
79
  getProcessEventLog,
80
80
  logEvent
81
- } from "./chunk-I52SWXYV.js";
81
+ } from "./chunk-KAUE3MSR.js";
82
82
 
83
83
  // src/shared/utils/config/env.ts
84
84
  var ENV_KEYS = {
@@ -11897,7 +11897,7 @@ After completion: record key loot/findings from the sub-agent output to canonica
11897
11897
  workerType: params["worker_type"],
11898
11898
  resumeTaskId: params["resume_task_id"]
11899
11899
  };
11900
- const { AgentTool } = await import("./agent-tool-MP274HWD.js");
11900
+ const { AgentTool } = await import("./agent-tool-3Y7YKMCZ.js");
11901
11901
  const executor = new AgentTool(state, events, scopeGuard, approvalGate);
11902
11902
  const result = await executor.execute(input);
11903
11903
  state.recordDelegatedTask({