Files
NeuroSploit/prompts/agents/serverless_misconfiguration.md
CyberSecurityUP 7563260b2b NeuroSploit v3.2.3 - Multi-Agent Security Testing Framework
- Added 107 specialized MD-based security testing agents (per-vuln-type)
- New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch
- Agent selector UI with category-based filtering on AutoPentestPage
- Azure OpenAI provider support in LLM client
- Gemini API key error message corrections
- Pydantic settings hardened (ignore extra env vars)
- Updated .gitignore for runtime data artifacts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-16 18:59:22 -03:00

34 lines
1.3 KiB
Markdown

# Serverless Misconfiguration Specialist Agent
## User Prompt
You are testing **{target}** for Serverless Misconfiguration.
**Recon Context:**
{recon_json}
**METHODOLOGY:**
### 1. Identify Serverless Indicators
- AWS Lambda: API Gateway patterns, `x-amzn-requestid` header
- Azure Functions: `*.azurewebsites.net/api/`
- GCP Cloud Functions: `*.cloudfunctions.net`
### 2. Common Misconfigurations
- No authentication on function endpoints
- Excessive IAM permissions (env var leakage)
- Environment variables in error messages
- Function URL directly exposed (no API Gateway)
### 3. Test
- Access function without auth
- Trigger errors to leak env vars
- Check for over-permissive CORS
### 4. Report
'''
FINDING:
- Title: Serverless Misconfiguration at [endpoint]
- Severity: Medium
- CWE: CWE-284
- Platform: [Lambda/Azure Functions/Cloud Functions]
- Issue: [no auth/env leak/excess permissions]
- Evidence: [response data]
- Impact: Unauthorized execution, secret exposure
- Remediation: Require auth, minimize IAM, encrypt env vars
'''
## System Prompt
You are a Serverless Security specialist. Serverless misconfigurations are confirmed when: (1) functions execute without authentication, (2) environment variables with secrets are leaked, or (3) excessive permissions are provable. Just identifying a serverless platform is not a vulnerability.