Files
NeuroSploit/backend/schemas/target.py
CyberSecurityUP e0935793c5 NeuroSploit v3.2 - Autonomous AI Penetration Testing Platform
116 modules | 100 vuln types | 18 API routes | 18 frontend pages

Major features:
- VulnEngine: 100 vuln types, 526+ payloads, 12 testers, anti-hallucination prompts
- Autonomous Agent: 3-stream auto pentest, multi-session (5 concurrent), pause/resume/stop
- CLI Agent: Claude Code / Gemini CLI / Codex CLI inside Kali containers
- Validation Pipeline: negative controls, proof of execution, confidence scoring, judge
- AI Reasoning: ReACT engine, token budget, endpoint classifier, CVE hunter, deep recon
- Multi-Agent: 5 specialists + orchestrator + researcher AI + vuln type agents
- RAG System: BM25/TF-IDF/ChromaDB vectorstore, few-shot, reasoning templates
- Smart Router: 20 providers (8 CLI OAuth + 12 API), tier failover, token refresh
- Kali Sandbox: container-per-scan, 56 tools, VPN support, on-demand install
- Full IA Testing: methodology-driven comprehensive pentest sessions
- Notifications: Discord, Telegram, WhatsApp/Twilio multi-channel alerts
- Frontend: React/TypeScript with 18 pages, real-time WebSocket updates
2026-02-22 17:59:28 -03:00

93 lines
2.6 KiB
Python
Executable File

"""
NeuroSploit v3 - Target Schemas
"""
from datetime import datetime
from typing import Optional, List
from pydantic import BaseModel, Field, field_validator
import re
class TargetCreate(BaseModel):
"""Schema for creating a target"""
url: str = Field(..., description="Target URL")
@field_validator('url')
@classmethod
def validate_url(cls, v: str) -> str:
"""Validate URL format"""
v = v.strip()
if not v:
raise ValueError("URL cannot be empty")
# Basic URL validation
url_pattern = re.compile(
r'^https?://' # http:// or https://
r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+[A-Z]{2,6}\.?|' # domain
r'localhost|' # localhost
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' # or ip
r'(?::\d+)?' # optional port
r'(?:/?|[/?]\S+)$', re.IGNORECASE)
if not url_pattern.match(v):
# Try adding https:// prefix
if url_pattern.match(f"https://{v}"):
return f"https://{v}"
raise ValueError(f"Invalid URL format: {v}")
return v
class TargetBulkCreate(BaseModel):
"""Schema for bulk target creation"""
urls: List[str] = Field(..., min_length=1, description="List of URLs")
@field_validator('urls')
@classmethod
def validate_urls(cls, v: List[str]) -> List[str]:
"""Validate and clean URLs"""
cleaned = []
url_pattern = re.compile(
r'^https?://'
r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+[A-Z]{2,6}\.?|'
r'localhost|'
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})'
r'(?::\d+)?'
r'(?:/?|[/?]\S+)$', re.IGNORECASE)
for url in v:
url = url.strip()
if not url:
continue
if url_pattern.match(url):
cleaned.append(url)
elif url_pattern.match(f"https://{url}"):
cleaned.append(f"https://{url}")
if not cleaned:
raise ValueError("No valid URLs provided")
return cleaned
class TargetValidation(BaseModel):
"""Schema for URL validation result"""
url: str
valid: bool
normalized_url: Optional[str] = None
hostname: Optional[str] = None
port: Optional[int] = None
protocol: Optional[str] = None
error: Optional[str] = None
class TargetResponse(BaseModel):
"""Schema for target response"""
id: str
scan_id: str
url: str
hostname: Optional[str]
port: Optional[int]
protocol: Optional[str]
path: Optional[str]
status: str
created_at: datetime
class Config:
from_attributes = True