mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-04-21 10:26:18 +02:00
59f8f42d80
- MD Agent system restructured: real HTTP exploitation, retry with exponential backoff, reduced concurrency (2 parallel, 2s stagger) - Claude 4.6 model support (Opus/Sonnet) with corrected API version headers - SmartRouter true failover with provider preference cascade - WAFResult attribute error fix in autonomous_agent.py - CVSS data sanitization for all vulnerability database saves - AI recon JSON parsing robustness improvements - rebuild.sh simplified from 714 to 196 lines - Frontend: removed unused routes, simplified Auto Pentest page - Agent grid: reduced max tests per agent (8→5), condensed recon prompts Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
154 lines
5.3 KiB
JSON
Executable File
154 lines
5.3 KiB
JSON
Executable File
{
|
|
"llm": {
|
|
"default_profile": "gemini_pro_default",
|
|
"profiles": {
|
|
"ollama_llama3_default": {
|
|
"provider": "ollama",
|
|
"model": "llama3:8b",
|
|
"api_key": "",
|
|
"temperature": 0.7,
|
|
"max_tokens": 4096,
|
|
"input_token_limit": 8000,
|
|
"output_token_limit": 4000,
|
|
"cache_enabled": true,
|
|
"search_context_level": "medium",
|
|
"pdf_support_enabled": false,
|
|
"guardrails_enabled": true,
|
|
"hallucination_mitigation_strategy": null
|
|
},
|
|
"gemini_pro_default": {
|
|
"provider": "gemini",
|
|
"model": "gemini-pro",
|
|
"api_key": "${GEMINI_API_KEY}",
|
|
"temperature": 0.7,
|
|
"max_tokens": 4096,
|
|
"input_token_limit": 30720,
|
|
"output_token_limit": 2048,
|
|
"cache_enabled": true,
|
|
"search_context_level": "medium",
|
|
"pdf_support_enabled": true,
|
|
"guardrails_enabled": true,
|
|
"hallucination_mitigation_strategy": "consistency_check"
|
|
},
|
|
"claude_opus_default": {
|
|
"provider": "claude",
|
|
"model": "claude-opus-4-6-20250918",
|
|
"api_key": "${ANTHROPIC_API_KEY}",
|
|
"temperature": 0.7,
|
|
"max_tokens": 16384,
|
|
"input_token_limit": 1000000,
|
|
"output_token_limit": 16384,
|
|
"cache_enabled": true,
|
|
"search_context_level": "high",
|
|
"pdf_support_enabled": true,
|
|
"guardrails_enabled": true,
|
|
"hallucination_mitigation_strategy": "self_reflection"
|
|
},
|
|
"gpt_4o_default": {
|
|
"provider": "gpt",
|
|
"model": "gpt-4o",
|
|
"api_key": "${OPENAI_API_KEY}",
|
|
"temperature": 0.7,
|
|
"max_tokens": 4096,
|
|
"input_token_limit": 128000,
|
|
"output_token_limit": 4096,
|
|
"cache_enabled": true,
|
|
"search_context_level": "high",
|
|
"pdf_support_enabled": true,
|
|
"guardrails_enabled": true,
|
|
"hallucination_mitigation_strategy": "consistency_check"
|
|
}
|
|
}
|
|
},
|
|
"agent_roles": {
|
|
"bug_bounty_hunter": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"subfinder",
|
|
"nuclei",
|
|
"burpsuite",
|
|
"sqlmap"
|
|
],
|
|
"description": "Focuses on web application vulnerabilities, leveraging recon and exploitation tools."
|
|
},
|
|
"blue_team_agent": {
|
|
"enabled": true,
|
|
"tools_allowed": [],
|
|
"description": "Analyzes logs and telemetry for threats, provides defensive strategies."
|
|
},
|
|
"exploit_expert": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"metasploit",
|
|
"nmap"
|
|
],
|
|
"description": "Devises exploitation strategies and payloads for identified vulnerabilities."
|
|
},
|
|
"red_team_agent": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"nmap",
|
|
"metasploit",
|
|
"hydra"
|
|
],
|
|
"description": "Plans and executes simulated attacks to test an organization's defenses."
|
|
},
|
|
"replay_attack_specialist": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"burpsuite"
|
|
],
|
|
"description": "Identifies and leverages replay attack vectors in network traffic or authentication."
|
|
},
|
|
"pentest_generalist": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"nmap",
|
|
"subfinder",
|
|
"nuclei",
|
|
"metasploit",
|
|
"burpsuite",
|
|
"sqlmap",
|
|
"hydra"
|
|
],
|
|
"description": "Performs comprehensive penetration tests across various domains."
|
|
},
|
|
"owasp_expert": {
|
|
"enabled": true,
|
|
"tools_allowed": [
|
|
"burpsuite",
|
|
"sqlmap"
|
|
],
|
|
"description": "Specializes in assessing web applications against OWASP Top 10 vulnerabilities."
|
|
},
|
|
"cwe_expert": {
|
|
"enabled": true,
|
|
"tools_allowed": [],
|
|
"description": "Analyzes code and reports for weaknesses based on MITRE CWE Top 25."
|
|
},
|
|
"malware_analyst": {
|
|
"enabled": true,
|
|
"tools_allowed": [],
|
|
"description": "Examines malware samples to understand functionality and identify IOCs."
|
|
}
|
|
},
|
|
"methodologies": {
|
|
"owasp_top10": true,
|
|
"cwe_top25": true,
|
|
"network_pentest": true,
|
|
"ad_pentest": true,
|
|
"web_security": true
|
|
},
|
|
"tools": {
|
|
"nmap": "/usr/bin/nmap",
|
|
"metasploit": "/usr/bin/msfconsole",
|
|
"burpsuite": "/usr/bin/burpsuite",
|
|
"sqlmap": "/usr/bin/sqlmap",
|
|
"hydra": "/usr/bin/hydra"
|
|
},
|
|
"output": {
|
|
"format": "json",
|
|
"verbose": true,
|
|
"save_artifacts": true
|
|
}
|
|
} |