Files
NeuroSploit/backend/schemas/vulnerability.py
CyberSecurityUP e0935793c5 NeuroSploit v3.2 - Autonomous AI Penetration Testing Platform
116 modules | 100 vuln types | 18 API routes | 18 frontend pages

Major features:
- VulnEngine: 100 vuln types, 526+ payloads, 12 testers, anti-hallucination prompts
- Autonomous Agent: 3-stream auto pentest, multi-session (5 concurrent), pause/resume/stop
- CLI Agent: Claude Code / Gemini CLI / Codex CLI inside Kali containers
- Validation Pipeline: negative controls, proof of execution, confidence scoring, judge
- AI Reasoning: ReACT engine, token budget, endpoint classifier, CVE hunter, deep recon
- Multi-Agent: 5 specialists + orchestrator + researcher AI + vuln type agents
- RAG System: BM25/TF-IDF/ChromaDB vectorstore, few-shot, reasoning templates
- Smart Router: 20 providers (8 CLI OAuth + 12 API), tier failover, token refresh
- Kali Sandbox: container-per-scan, 56 tools, VPN support, on-demand install
- Full IA Testing: methodology-driven comprehensive pentest sessions
- Notifications: Discord, Telegram, WhatsApp/Twilio multi-channel alerts
- Frontend: React/TypeScript with 18 pages, real-time WebSocket updates
2026-02-22 17:59:28 -03:00

73 lines
1.7 KiB
Python
Executable File

"""
NeuroSploit v3 - Vulnerability Schemas
"""
from datetime import datetime
from typing import Optional, List
from pydantic import BaseModel
class VulnerabilityTestResponse(BaseModel):
"""Schema for vulnerability test response"""
id: str
scan_id: str
endpoint_id: Optional[str]
vulnerability_type: str
payload: Optional[str]
request_data: dict
response_data: dict
is_vulnerable: bool
confidence: Optional[float]
evidence: Optional[str]
tested_at: datetime
class Config:
from_attributes = True
class VulnerabilityResponse(BaseModel):
"""Schema for vulnerability response"""
id: str
scan_id: str
test_id: Optional[str]
title: str
vulnerability_type: str
severity: str
cvss_score: Optional[float]
cvss_vector: Optional[str]
cwe_id: Optional[str]
description: Optional[str]
affected_endpoint: Optional[str]
poc_request: Optional[str]
poc_response: Optional[str]
poc_payload: Optional[str]
impact: Optional[str]
remediation: Optional[str]
references: List
ai_analysis: Optional[str]
created_at: datetime
class Config:
from_attributes = True
class VulnerabilityTypeInfo(BaseModel):
"""Information about a vulnerability type"""
type: str
name: str
category: str
description: str
severity_range: str # "medium-critical"
owasp_category: Optional[str] = None
cwe_ids: List[str] = []
class VulnerabilitySummary(BaseModel):
"""Summary of vulnerabilities for dashboard"""
total: int = 0
critical: int = 0
high: int = 0
medium: int = 0
low: int = 0
info: int = 0
by_type: dict = {}