Files
god-eye/SECURITY.md
Vyntral 14718dd75f 🚀 God's Eye v0.1 - Initial Release
God's Eye is an ultra-fast subdomain enumeration and reconnaissance tool with AI-powered security analysis.

##  Key Features

### 🔍 Comprehensive Enumeration
- 20+ passive sources (crt.sh, Censys, URLScan, etc.)
- DNS brute-force with smart wordlists
- Wildcard detection and filtering
- 1000 concurrent workers for maximum speed

### 🌐 Deep Reconnaissance
- HTTP probing with 13+ security checks
- Port scanning (configurable)
- TLS/SSL fingerprinting
- Technology detection (Wappalyzer-style)
- WAF detection (Cloudflare, Akamai, etc.)
- Security header analysis
- JavaScript secrets extraction
- Admin panel & API discovery
- Backup file detection
- robots.txt & sitemap.xml checks

### 🎯 Subdomain Takeover Detection
- 110+ fingerprints (AWS, Azure, GitHub Pages, Heroku, etc.)
- CNAME validation
- Dead DNS detection

### 🤖 AI-Powered Analysis (NEW!)
- Local AI using Ollama - No API costs, complete privacy
- Real-time CVE detection via function calling (queries NVD database)
- Cascade architecture: phi3.5 (fast triage) + qwen2.5-coder (deep analysis)
- JavaScript security analysis
- HTTP response anomaly detection
- Executive summary reports

### 📊 Output Formats
- Pretty terminal output with colors
- JSON export
- CSV export
- TXT (simple subdomain list)
- Silent mode for piping

## 🚀 Installation

bash
go install github.com/Vyntral/god-eye@latest

## 📖 Quick Start

bash
# Basic scan
god-eye -d example.com

# With AI analysis
god-eye -d example.com --enable-ai

# Only active hosts
god-eye -d example.com --active

# Export to JSON
god-eye -d example.com -o results.json -f json

## 🎯 Use Cases
- Bug bounty reconnaissance
- Penetration testing
- Security audits
- Attack surface mapping
- Red team operations

## ⚠️ Legal Notice
This tool is for authorized security testing only. Users must obtain explicit permission before scanning any targets. Unauthorized access is illegal.

## 📄 License
MIT License with additional security tool terms - see LICENSE file

## 🙏 Credits
Built with ❤️ by Vyntral for Orizon
Powered by Go, Ollama, and the security community

---

🤖 Generated with Claude Code
https://claude.com/claude-code

Co-Authored-By: Claude <noreply@anthropic.com>
2025-11-20 10:41:05 +01:00

130 lines
3.6 KiB
Markdown

# Security Policy
## Responsible Use
God's Eye is a powerful security reconnaissance tool. With great power comes great responsibility.
### Ethical Guidelines
**DO:**
- Use for authorized penetration testing
- Participate in bug bounty programs
- Conduct security research on your own systems
- Help improve security through responsible disclosure
- Follow coordinated vulnerability disclosure processes
**DO NOT:**
- Scan systems without explicit permission
- Use for malicious purposes
- Violate terms of service
- Attempt unauthorized access
- Sell or distribute scan results without authorization
## Reporting Security Issues
### Vulnerability Disclosure
If you discover a security vulnerability in God's Eye itself, please report it responsibly:
1. **DO NOT** open a public issue
2. Email the maintainers privately (see GitHub profile for contact)
3. Provide detailed information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
### Response Timeline
- **Acknowledgment**: Within 48 hours
- **Initial Assessment**: Within 7 days
- **Fix Development**: Depends on severity
- **Public Disclosure**: After fix is released
## Security Best Practices
### For Users
1. **Always verify authorization** before scanning
2. **Keep the tool updated** to latest version
3. **Use in controlled environments** when testing
4. **Respect rate limits** to avoid service disruption
5. **Secure your scan results** - they may contain sensitive data
### For Developers
1. **Review code changes** for security implications
2. **Follow secure coding practices**
3. **Test thoroughly** before releasing
4. **Document security-relevant changes**
5. **Never commit credentials** or sensitive data
## Compliance
### Legal Requirements
Users must comply with:
- **United States**: Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030
- **European Union**: GDPR, ePrivacy Directive, NIS2 Directive
- **United Kingdom**: Computer Misuse Act 1990
- **International**: Budapest Convention on Cybercrime
- **Local laws**: All applicable regional regulations
### Bug Bounty Programs
When using God's Eye for bug bounty hunting:
1. ✅ Read and follow program rules
2. ✅ Respect scope limitations
3. ✅ Avoid testing production systems unless explicitly allowed
4. ✅ Report findings through proper channels
5. ✅ Do not publicly disclose before program authorization
## Data Protection
### Handling Scan Results
Scan results may contain sensitive information:
- Private IP addresses
- Technology stack details
- Potential vulnerabilities
- Configuration information
**Your Responsibilities:**
1. Store results securely
2. Encrypt sensitive data
3. Delete when no longer needed
4. Do not share without authorization
5. Comply with GDPR and data protection laws
## Disclaimer
**NO WARRANTY**: This software is provided "AS IS" without warranty of any kind.
**NO LIABILITY**: The authors are not responsible for:
- Misuse of this tool
- Unauthorized access attempts
- Legal consequences of improper use
- Data breaches or security incidents
- Any damages arising from use
**USER RESPONSIBILITY**: You are solely responsible for ensuring:
- You have proper authorization
- Your use complies with all laws
- You accept all risks
- You will not hold authors liable
## Contact
For security-related questions:
- Check the [LICENSE](LICENSE) file for legal terms
- Review the [README](README.md) for usage guidelines
- Contact maintainers through GitHub for private security reports
---
**Remember: Unauthorized computer access is illegal. Always get permission first.**