You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add New Security Assessment Prompts and API Provider Configurations (#25)
* Add business logic vulnerability assessment guidelines
Added guidelines for assessing business logic vulnerabilities in web applications, focusing on various manipulation techniques and potential flaws.
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Create API security analysis guidelines for GraphQL and REST
Added detailed guidelines for API security analysis focusing on GraphQL and REST vulnerabilities.
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Create client_side.txt for web security analysis
Added guidelines for conducting client-side security analysis, focusing on various vulnerabilities and security practices.
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Add configuration for Google Gemini 1.5 Flash API
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Add configuration for Google Gemini 1.5 Pro
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Add configuration for Anthropic Claude 4 Opus
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
* Update README with new inference examples
Added examples for new Anthropic and Google Gemini inference models.
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
---------
Signed-off-by: Ziad <153237520+Zierax@users.noreply.github.com>
"api_key": "{$GOOGLE_API_KEY}", <-- replace with your API key in the local config file
175
+
"model": "gemini-1.5-pro",
176
+
"generation_config": {
177
+
"temperature": 0.1,
178
+
"top_p": 0.95,
179
+
"top_k": 40,
180
+
"max_output_tokens": 8192
181
+
},
182
+
"safety_settings": [
183
+
{
184
+
"category": "HARM_CATEGORY_HARASSMENT",
185
+
"threshold": "BLOCK_NONE"
186
+
},
187
+
{
188
+
"category": "HARM_CATEGORY_HATE_SPEECH",
189
+
"threshold": "BLOCK_NONE"
190
+
},
191
+
{
192
+
"category": "HARM_CATEGORY_SEXUALLY_EXPLICIT",
193
+
"threshold": "BLOCK_NONE"
194
+
},
195
+
{
196
+
"category": "HARM_CATEGORY_DANGEROUS_CONTENT",
197
+
"threshold": "BLOCK_NONE"
198
+
}
199
+
]
200
+
}
201
+
```
202
+
203
+
---
204
+
103
205
### HuggingFace Serveless Inference
104
206
105
207
#### Example HuggingFace `/text-generation` inference
@@ -146,4 +248,4 @@ In order to serve inference as part of burpference, the model must be running on
146
248
147
249
By default, the system prompt sent as pretext to the model is defined [here](../prompts/proxy_prompt.txt), feel free to edit, tune and tweak as you see fit. This is also true for the scanner extension tab.
You are a web application penetration tester conducting a specialized assessment focused on business logic vulnerabilities and application workflow flaws.
2
+
Your objective is to examine HTTP requests and responses for logic-based security issues that bypass intended application behavior.
3
+
4
+
This analysis will focus on:
5
+
6
+
- Workflow Manipulation: Identify step-skipping, race conditions, and state manipulation opportunities
- Missing server-side validation of critical operations
14
+
- Inconsistent state enforcement across workflows
15
+
- Race conditions in multi-step processes
16
+
- Replay attack opportunities
17
+
- Business rule bypass through parameter manipulation
18
+
- Insufficient verification of transaction integrity
19
+
- Coupon/discount code abuse potential
20
+
- Referral/reward system exploitation
21
+
22
+
Use reasoning and context to identify business logic flaws by analyzing the sequence of operations, parameter relationships, and workflow dependencies. Consider how an attacker might abuse intended functionality.
23
+
24
+
If you identify any vulnerabilities, include the severity of the finding as prepend (case-sensitive) in your response with any of the levels:
25
+
- "CRITICAL"
26
+
- "HIGH"
27
+
- "MEDIUM"
28
+
- "LOW"
29
+
- "INFORMATIONAL"
30
+
31
+
Not every request and response may have indicators. Be concise yet deterministic in your analysis.
32
+
33
+
The HTTP request and response pair are provided below this line:
0 commit comments