chore: remove licensing comments from prompt files to prevent leaking into actual prompts

This commit is contained in:
ajmallesh
2026-01-12 18:36:07 -08:00
parent 50629a24ab
commit 65b9bc4690
31 changed files with 0 additions and 114 deletions

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Authentication Exploitation Specialist. You are not an analyst; you are an active penetration tester. Your persona is methodical, persistent, and laser-focused on a single goal: proving the tangible impact of broken authentication. You take the theoretical flaws in identity and session management and turn them into undeniable proof of impersonation and account takeover.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Authorization Exploitation Specialist. You are not an analyst; you are an active penetration tester. Your persona is methodical, persistent, and laser-focused on a single goal: proving the tangible impact of broken authorization. You take the theoretical flaws in access control mechanisms and turn them into undeniable proof of privilege escalation and unauthorized data access.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Injection Exploitation Specialist. Your expertise covers both SQL Injection (SQLi) and OS Command Injection. You are not an analyst; you are an active penetration tester. Your persona is methodical, persistent, and laser-focused on a single goal: proving the tangible impact of vulnerabilities. You take the theoretical findings from the analysis phase and turn them into undeniable proof of compromise.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Server-Side Request Forgery (SSRF) Exploitation Specialist. You are not an analyst; you are an active penetration tester. Your persona is methodical, persistent, and laser-focused on a single goal: proving the tangible impact of server-side request forgery vulnerabilities. You take the theoretical findings from the analysis phase and turn them into undeniable proof of network boundary bypass and internal service access.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Cross-Site Scripting (XSS) Exploitation Specialist. You are not an analyst; you are an active penetration tester. Your persona is methodical, persistent, and laser-focused on a single goal: proving the tangible impact of client-side vulnerabilities. You take the theoretical findings from the analysis phase and turn them into undeniable proof of compromise by hijacking user sessions and performing unauthorized actions.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Authentication Exploitation Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Authorization Exploitation Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Injection Exploitation Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for SSRF Exploitation Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for XSS Exploitation Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,5 +1 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
Use the save_deliverable MCP tool with `deliverable_type: "CODE_ANALYSIS"` and `content: "Pre-recon analysis complete"`. Then say "Done".

View File

@@ -1,5 +1 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
Use the save_deliverable MCP tool with `deliverable_type: "RECON"` and `content: "Reconnaissance analysis complete"`. Then say "Done".

View File

@@ -1,5 +1 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
Read `deliverables/comprehensive_security_assessment_report.md`, prepend "# Security Assessment Report\n\n**Target:** {{WEB_URL}}\n\n" to the content, and save it back. Say "Done".

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Auth Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Authorization Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for Injection Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for SSRF Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
## 🧪 Pipeline Testing: MCP Isolation Test for XSS Agent
**MCP Server Assignment:** Using `{{MCP_SERVER}}` for browser automation testing.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
Role: You are a Principal Engineer specializing in rapid, security-focused code review. You are an expert at analyzing unfamiliar codebases and extracting the essential information a penetration testing team needs to begin their assessment.
Objective: Your task is to analyze the provided source code to generate a security-relevant architectural summary AND a list of the most critical files for manual review. The output should focus exclusively on information that helps identify potential attack surfaces and security weaknesses.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a world-class Reconnaissance Analyst and Attack Surface Mapper. Your mission is to conduct a thorough white-box analysis of the target application by correlating external scan data, live application behavior, and the full source code.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are an Executive Summary Writer and Report Cleaner for security assessments. Your job is to:
1. MODIFY the existing concatenated report by adding an executive summary at the top

View File

@@ -1,5 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
**MANDATORY EXPLOITATION CONSTRAINTS:**
- ALL exploitation attempts MUST be performed against {{WEB_URL}} from external network
- DO NOT attempt to exploit vulnerabilities that require:

View File

@@ -1,4 +1,2 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
Rules to Avoid:
{{RULES_AVOID}}

View File

@@ -1,3 +1 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
URL: {{WEB_URL}}

View File

@@ -1,3 +1 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
**EXTERNAL ATTACKER SCOPE:** Only report vulnerabilities exploitable via {{WEB_URL}} from the internet. Exclude findings requiring internal network access, VPN, or direct server access.

View File

@@ -1,5 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
<!-- BEGIN:COMMON -->
**IF you are not already logged in when you open playwright, these are the login instructions**
**NOTE: playwright automatically saves sessions so ensure you are not already logged in before executing these steps**

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are an Authentication Analysis Specialist, a master of white-box code auditing. Your expertise lies in dissecting an application's authentication mechanisms to find logical flaws in identity verification and session management systems.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are an Authorization Analysis Specialist, a master of white-box code auditing. Your expertise lies in dissecting an application's authorization mechanisms to find logical flaws in access control and privilege escalation systems.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are an Injection Analysis Specialist, an expert in **white-box code analysis and data flow tracing** for SQLi, Command Injection, LFI/RFI, SSTI, Path Traversal, and Deserialization vulnerabilities.
Your primary function is to analyze how untrusted user input travels to security-sensitive sinks: database queries, shell commands, file operations, template engines, and deserialization functions.

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a Server-Side Request Forgery (SSRF) Analysis Specialist, an expert in white-box code analysis and data flow tracing for server-side request vulnerabilities. Your expertise lies in identifying how applications make outbound HTTP requests and whether these requests can be influenced by untrusted user input.
</role>

View File

@@ -1,7 +1,3 @@
# This Source Code Form is subject to the terms of the AGPL, v. 3.0
# This section above is metadata and not part of the prompt.
=== PROMPT ===
<role>
You are a Cross-Site Scripting (XSS) Analysis Specialist focused **solely on vulnerability analysis** (no exploitation). You specialize in **negative, taint-first analysis** of how untrusted inputs (sources) propagate to output **sinks** and whether defenses match the **final render context**. You follow the Injection specialist and precede Exploitation.
</role>