mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-18 16:23:47 +00:00
116 modules | 100 vuln types | 18 API routes | 18 frontend pages Major features: - VulnEngine: 100 vuln types, 526+ payloads, 12 testers, anti-hallucination prompts - Autonomous Agent: 3-stream auto pentest, multi-session (5 concurrent), pause/resume/stop - CLI Agent: Claude Code / Gemini CLI / Codex CLI inside Kali containers - Validation Pipeline: negative controls, proof of execution, confidence scoring, judge - AI Reasoning: ReACT engine, token budget, endpoint classifier, CVE hunter, deep recon - Multi-Agent: 5 specialists + orchestrator + researcher AI + vuln type agents - RAG System: BM25/TF-IDF/ChromaDB vectorstore, few-shot, reasoning templates - Smart Router: 20 providers (8 CLI OAuth + 12 API), tier failover, token refresh - Kali Sandbox: container-per-scan, 56 tools, VPN support, on-demand install - Full IA Testing: methodology-driven comprehensive pentest sessions - Notifications: Discord, Telegram, WhatsApp/Twilio multi-channel alerts - Frontend: React/TypeScript with 18 pages, real-time WebSocket updates
73 lines
1.7 KiB
Python
Executable File
73 lines
1.7 KiB
Python
Executable File
"""
|
|
NeuroSploit v3 - Vulnerability Schemas
|
|
"""
|
|
from datetime import datetime
|
|
from typing import Optional, List
|
|
from pydantic import BaseModel
|
|
|
|
|
|
class VulnerabilityTestResponse(BaseModel):
|
|
"""Schema for vulnerability test response"""
|
|
id: str
|
|
scan_id: str
|
|
endpoint_id: Optional[str]
|
|
vulnerability_type: str
|
|
payload: Optional[str]
|
|
request_data: dict
|
|
response_data: dict
|
|
is_vulnerable: bool
|
|
confidence: Optional[float]
|
|
evidence: Optional[str]
|
|
tested_at: datetime
|
|
|
|
class Config:
|
|
from_attributes = True
|
|
|
|
|
|
class VulnerabilityResponse(BaseModel):
|
|
"""Schema for vulnerability response"""
|
|
id: str
|
|
scan_id: str
|
|
test_id: Optional[str]
|
|
title: str
|
|
vulnerability_type: str
|
|
severity: str
|
|
cvss_score: Optional[float]
|
|
cvss_vector: Optional[str]
|
|
cwe_id: Optional[str]
|
|
description: Optional[str]
|
|
affected_endpoint: Optional[str]
|
|
poc_request: Optional[str]
|
|
poc_response: Optional[str]
|
|
poc_payload: Optional[str]
|
|
impact: Optional[str]
|
|
remediation: Optional[str]
|
|
references: List
|
|
ai_analysis: Optional[str]
|
|
created_at: datetime
|
|
|
|
class Config:
|
|
from_attributes = True
|
|
|
|
|
|
class VulnerabilityTypeInfo(BaseModel):
|
|
"""Information about a vulnerability type"""
|
|
type: str
|
|
name: str
|
|
category: str
|
|
description: str
|
|
severity_range: str # "medium-critical"
|
|
owasp_category: Optional[str] = None
|
|
cwe_ids: List[str] = []
|
|
|
|
|
|
class VulnerabilitySummary(BaseModel):
|
|
"""Summary of vulnerabilities for dashboard"""
|
|
total: int = 0
|
|
critical: int = 0
|
|
high: int = 0
|
|
medium: int = 0
|
|
low: int = 0
|
|
info: int = 0
|
|
by_type: dict = {}
|