@@ -8,6 +8,7 @@ model_config: seclab_taskflows.configs.model_config
88
99globals :
1010 repo :
11+ use_advisory :
1112# Taskflow to analyze the general contextual information of a project and classify the different applications within it
1213taskflow :
1314 - task :
@@ -36,8 +37,12 @@ taskflow:
3637 Fetch the entry points and web entry points of the component, then the user actions of this component.
3738 Based on the entry points, web entry points, components, user actions and README.md and if available, SECURITY.md in the {{ globals.repo }},
3839 can you tell me what type of application this repo is and what kind of security boundary it has.
39- Based on this, determine whether the component is likely to have security problems.
40-
40+ Based on this, determine whether the component is likely to have security problems.
41+
42+ {% if globals.use_advisory == 'true' %}
43+ {% include 'seclab_taskflows.prompts.audit.known_security_advisories' %}
44+ {% endif %}
45+
4146 Identify the most likely security problems in the component. Your task is not to carry out a full audit, but to
4247 identify the main risk in the component so that further analysis can be carried out.
4348 Do not be too specific about an issue, but rather craft your report based on the general functionality and type of
@@ -50,7 +55,7 @@ taskflow:
5055 - Is this component likely to take untrusted user input? For example, remote web requests or IPC, RPC calls?
5156 - What is the intended purpose of this component and its functionality? Does it allow high privileged actions?
5257 Is it intended to provide such functionalities for all users? Or is there complex access control logic involved?
53- - The component itself may also have its own `README.md` (or a subdirectory of it may have a `README.md`). Take
58+ - The component itself may also have its own `README.md` (or a subdirectory of it may have a `README.md`). Take
5459 a look at those files to help understand the functionality of the component.
5560
5661 For example, an Admin UI/dashboard may be susceptible to client side Javascript vulnerabilities such as XSS, CSRF.
@@ -60,7 +65,7 @@ taskflow:
6065 a web frontend may allow users to access their own content and admins to access all content, but users should not
6166 be able to access another users' content in general.
6267
63- We're looking for more concrete and serious security issues that affects system integrity or
68+ We're looking for more concrete and serious security issues that affects system integrity or
6469 lead to information leak, so please do not include issues like brute force, Dos, log injection etc.
6570
6671 Also do not include issues that require the system to be already compromised, such as issues that rely on malicious
@@ -72,9 +77,9 @@ taskflow:
7277 Your task is to identify risk rather than properly audit and find security issues. Do not look too much into
7378 the implementation or scrutinize the security measures such as access control and sanitizers at this stage.
7479 Instead, report more general risks that are associated with the type of component
75- that you are looking at.
80+ that you are looking at.
7681
77- It is not your task to audit the security measures, but rather just to identify the risks and suggest some issues
82+ It is not your task to audit the security measures, but rather just to identify the risks and suggest some issues
7883 that is worth auditing.
7984
8085 Reflect on your notes and check that the attack scenario meets the above requirements. Exclude low severity issues or
@@ -84,4 +89,5 @@ taskflow:
8489 If you think the issues satisfy the criteria, store a component issue entry for each type of issue identified.
8590 toolboxes :
8691 - seclab_taskflows.toolboxes.repo_context
87- - seclab_taskflows.toolboxes.local_file_viewer
92+ - seclab_taskflows.toolboxes.local_file_viewer
93+ - seclab_taskflow_agent.toolboxes.memcache
0 commit comments