Files
hexstrike-ai/vuln_intel_config.json
2025-07-31 04:45:50 +05:00

102 lines
3.8 KiB
JSON

{
"vulnerability_intelligence": {
"enabled": true,
"description": "Advanced vulnerability intelligence and exploit generation system",
"version": "6.0",
"features": {
"cve_monitoring": {
"enabled": true,
"default_hours": 24,
"default_severity": "HIGH,CRITICAL",
"max_results": 100,
"cache_ttl": 3600
},
"exploit_generation": {
"enabled": true,
"supported_types": ["poc", "weaponized", "stealth"],
"supported_architectures": ["x86", "x64", "arm"],
"supported_os": ["windows", "linux", "macos"],
"evasion_levels": ["none", "basic", "advanced"]
},
"attack_chains": {
"enabled": true,
"max_depth": 5,
"default_depth": 3,
"include_zero_days": false
},
"threat_intelligence": {
"enabled": true,
"supported_sources": ["cve", "exploit-db", "github", "twitter"],
"timeframes": ["7d", "30d", "90d", "1y"],
"max_indicators": 50
},
"advanced_payloads": {
"enabled": true,
"attack_types": ["rce", "privilege_escalation", "persistence", "exfiltration", "xss", "sqli", "lfi", "ssrf"],
"evasion_levels": ["basic", "standard", "advanced", "nation-state"],
"max_payload_size": 10240
},
"zero_day_research": {
"enabled": true,
"analysis_depths": ["quick", "standard", "comprehensive"],
"max_vulnerabilities": 10
}
},
"api_endpoints": {
"cve_monitor": "/api/vuln-intel/cve-monitor",
"exploit_generate": "/api/vuln-intel/exploit-generate",
"attack_chains": "/api/vuln-intel/attack-chains",
"threat_feeds": "/api/vuln-intel/threat-feeds",
"zero_day_research": "/api/vuln-intel/zero-day-research",
"advanced_payloads": "/api/ai/advanced-payload-generation"
},
"rate_limits": {
"cve_monitor": "10/hour",
"exploit_generate": "5/hour",
"attack_chains": "3/hour",
"threat_feeds": "20/hour",
"zero_day_research": "2/hour",
"advanced_payloads": "15/hour"
},
"security": {
"require_authentication": false,
"log_all_requests": true,
"sanitize_outputs": true,
"disclaimer_required": true
}
},
"mcp_tools": {
"monitor_cve_feeds": {
"description": "Monitor CVE databases for new vulnerabilities with AI analysis",
"parameters": ["hours", "severity_filter", "keywords"]
},
"generate_exploit_from_cve": {
"description": "Generate working exploits from CVE information using AI",
"parameters": ["cve_id", "target_os", "target_arch", "exploit_type", "evasion_level"]
},
"discover_attack_chains": {
"description": "Discover multi-stage attack chains with vulnerability correlation",
"parameters": ["target_software", "attack_depth", "include_zero_days"]
},
"research_zero_day_opportunities": {
"description": "Automated zero-day vulnerability research using AI analysis",
"parameters": ["target_software", "analysis_depth", "source_code_url"]
},
"correlate_threat_intelligence": {
"description": "Correlate threat intelligence across multiple sources",
"parameters": ["indicators", "timeframe", "sources"]
},
"advanced_payload_generation": {
"description": "Generate advanced payloads with AI-powered evasion techniques",
"parameters": ["attack_type", "target_context", "evasion_level", "custom_constraints"]
},
"vulnerability_intelligence_dashboard": {
"description": "Get comprehensive vulnerability intelligence dashboard",
"parameters": []
},
"threat_hunting_assistant": {
"description": "AI-powered threat hunting assistant with vulnerability correlation",
"parameters": ["target_environment", "threat_indicators", "hunt_focus"]
}
}
}