sicario-red-team 0.1.4 → 0.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "sicario-red-team",
3
- "version": "0.1.4",
3
+ "version": "0.1.7",
4
4
  "description": "Autonomous Agentic Red-Teaming Swarm Protocol",
5
5
  "type": "module",
6
6
  "files": [
@@ -102,16 +102,23 @@ export async function hitCommand(target, options) {
102
102
  title: raw.title || "Unknown Logic Flaw",
103
103
  vector: raw.vector || "Vector analysis inconclusive.",
104
104
  severity: raw.severity || "MEDIUM",
105
- targetElement: raw.targetElement || "General DOM Context",
105
+ targetElement: raw.targetElement || raw.target || "General DOM Context",
106
+ target: raw.target || raw.targetElement || "General DOM Context", // Double-mapping for safety
106
107
  mitigation: raw.mitigation || "Implement standard server-side validation guards.",
107
108
  thoughtProcess: raw.thoughtProcess || "Reasoning engine offline."
108
109
  });
109
110
 
110
111
  const clean = sanitize(breachReport);
111
112
 
112
- console.log('\n' + theme.exploit(`${clean.title} locked on ${clean.targetElement}`));
113
- console.log(pc.red(`Vector: ${clean.vector}`));
114
- console.log(pc.red(`Severity: ${clean.severity}\n`));
113
+ const nodeName = clean.thoughtProcess.includes("Accountant") ? "THE ACCOUNTANT" :
114
+ clean.thoughtProcess.includes("Admin") ? "THE ADMIN" :
115
+ clean.thoughtProcess.includes("Chaos") ? "THE CHAOS MONKEY" : "GENERAL BREACHER";
116
+
117
+ console.log('\n' + pc.bold(pc.red(` ⚠ EXPLOIT SUCCESSFUL [${clean.title}]`)));
118
+ console.log(pc.cyan(` ◇ AGENT IDENTIFIED: ${nodeName}`));
119
+ console.log(pc.red(` Vector: ${clean.vector}`));
120
+ console.log(pc.red(` Target: ${clean.targetElement}`));
121
+ console.log(pc.red(` Severity: ${clean.severity}\n`));
115
122
 
116
123
  if (client && missionId) {
117
124
  await client.mutation('handler:logExploit', {