# NeuroSploit v3.0.0 — Release Notes **Release Date:** February 2026 **Codename:** Autonomous Pentester **License:** MIT --- ## Overview NeuroSploit v3 is a ground-up overhaul of the AI-powered penetration testing platform. This release transforms the tool from a scanner into an autonomous pentesting agent — capable of reasoning, adapting strategy in real-time, chaining exploits, validating findings with anti-hallucination safeguards, and executing tools inside isolated Kali Linux containers. ### By the Numbers | Metric | Count | |--------|-------| | Vulnerability types supported | 100 | | Payload libraries | 107 | | Total payloads | 477+ | | Kali sandbox tools | 55 | | Backend core modules | 63 Python files | | Backend core code | 37,546 lines | | Autonomous agent | 7,592 lines | | AI decision prompts | 100 (per-vuln-type) | | Anti-hallucination prompts | 12 composable templates | | Proof-of-execution rules | 100 (per-vuln-type) | | Known CVE signatures | 400 | | EOL version checks | 19 | | WAF signatures | 16 | | WAF bypass techniques | 12 | | Exploit chain rules | 10+ | | Frontend pages | 14 | | API endpoints | 111+ | | LLM providers supported | 6 | --- ## Architecture ``` +---------------------+ | React/TypeScript | | Frontend (14p) | +----------+----------+ | WebSocket + REST | +----------v----------+ | FastAPI Backend | | 14 API routers | +----------+----------+ | +---------+--------+--------+---------+ | | | | | +----v---+ +---v----+ +v------+ +v------+ +v--------+ | LLM | | Vuln | | Agent | | Kali | | Report | | Manager| | Engine | | Core | |Sandbox| | Engine | | 6 provs| | 100typ | |7592 ln| | 55 tl | | 2 fmts | +--------+ +--------+ +-------+ +-------+ +---------+ ``` **Stack:** Python 3.10+ / FastAPI / SQLAlchemy (async) / React 18 / TypeScript / Tailwind CSS / Vite / Docker --- ## Core Engine: 100 Vulnerability Types The vulnerability engine covers 100 distinct vulnerability types organized in 10 categories with dedicated testers, payloads, AI prompts, and proof-of-execution rules for each. ### Categories & Types | Category | Types | Examples | |----------|-------|---------| | **Injection** | 12 | SQLi (error, union, blind, time-based), Command Injection, SSTI, NoSQL, LDAP, XPath, Expression Language, HTTP Parameter Pollution | | **XSS** | 3 | Reflected, Stored (two-phase form+display), DOM-based | | **Authentication** | 7 | Auth Bypass, JWT Manipulation, Session Fixation, Weak Password, Default Credentials, 2FA Bypass, OAuth Misconfig | | **Authorization** | 5 | IDOR, BOLA, BFLA, Privilege Escalation, Mass Assignment, Forced Browsing | | **Client-Side** | 9 | CORS, Clickjacking, Open Redirect, DOM Clobbering, PostMessage, WebSocket Hijack, Prototype Pollution, CSS Injection, Tabnabbing | | **File Access** | 5 | LFI, RFI, Path Traversal, XXE, File Upload | | **Request Forgery** | 3 | SSRF, SSRF Cloud (AWS/GCP/Azure metadata), CSRF | | **Infrastructure** | 7 | Security Headers, SSL/TLS, HTTP Methods, Directory Listing, Debug Mode, Exposed Admin, Exposed API Docs, Insecure Cookies | | **Advanced** | 9 | Race Condition, Business Logic, Rate Limit Bypass, Type Juggling, Timing Attack, Host Header Injection, HTTP Smuggling, Cache Poisoning, CRLF | | **Data Exposure** | 6 | Sensitive Data, Information Disclosure, API Key Exposure, Source Code Disclosure, Backup Files, Version Disclosure | | **Cloud & Supply Chain** | 6 | S3 Misconfig, Cloud Metadata, Subdomain Takeover, Vulnerable Dependency, Container Escape, Serverless Misconfig | ### Injection Routing Every vulnerability type is routed to the correct injection point: - **Parameter injection** (default): SQLi, XSS, IDOR, SSRF, etc. - **Header injection**: CRLF, Host Header, HTTP Smuggling - **Body injection**: XXE - **Path injection**: Path Traversal, LFI - **Both (param + path)**: LFI, directory traversal variants ### XSS Pipeline (Reflected) The reflected XSS engine is a multi-stage pipeline: 1. **Canary probe** — unique marker per endpoint+param to detect reflection 2. **Context analysis** — 8 contexts: html_body, attribute_value, script_string, script_block, html_comment, url_context, style_context, event_handler 3. **Filter detection** — batch probe to map allowed/blocked chars, tags, events 4. **AI payload generation** — LLM generates context-aware bypass payloads 5. **Escalation payloads** — WAF/encoding bypass variants 6. **Testing** — up to 30 payloads per param with per-payload dedup 7. **Browser validation** — Playwright popup/cookie/DOM/event verification (optional) ### POST Form Support - HTML forms detected during recon with method, action, all input fields (including `