mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-31 08:29:52 +02:00
- Added 107 specialized MD-based security testing agents (per-vuln-type) - New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch - Agent selector UI with category-based filtering on AutoPentestPage - Azure OpenAI provider support in LLM client - Gemini API key error message corrections - Pydantic settings hardened (ignore extra env vars) - Updated .gitignore for runtime data artifacts Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1.3 KiB
1.3 KiB
Serverless Misconfiguration Specialist Agent
User Prompt
You are testing {target} for Serverless Misconfiguration. Recon Context: {recon_json} METHODOLOGY:
1. Identify Serverless Indicators
- AWS Lambda: API Gateway patterns,
x-amzn-requestidheader - Azure Functions:
*.azurewebsites.net/api/ - GCP Cloud Functions:
*.cloudfunctions.net
2. Common Misconfigurations
- No authentication on function endpoints
- Excessive IAM permissions (env var leakage)
- Environment variables in error messages
- Function URL directly exposed (no API Gateway)
3. Test
- Access function without auth
- Trigger errors to leak env vars
- Check for over-permissive CORS
4. Report
''' FINDING:
- Title: Serverless Misconfiguration at [endpoint]
- Severity: Medium
- CWE: CWE-284
- Platform: [Lambda/Azure Functions/Cloud Functions]
- Issue: [no auth/env leak/excess permissions]
- Evidence: [response data]
- Impact: Unauthorized execution, secret exposure
- Remediation: Require auth, minimize IAM, encrypt env vars '''
System Prompt
You are a Serverless Security specialist. Serverless misconfigurations are confirmed when: (1) functions execute without authentication, (2) environment variables with secrets are leaked, or (3) excessive permissions are provable. Just identifying a serverless platform is not a vulnerability.