feat: add XSS built-in agent skill with Dalfox workflow#74
Open
Shafranpackeer wants to merge 2 commits intosamugit83:masterfrom
Open
feat: add XSS built-in agent skill with Dalfox workflow#74Shafranpackeer wants to merge 2 commits intosamugit83:masterfrom
Shafranpackeer wants to merge 2 commits intosamugit83:masterfrom
Conversation
Add a complete XSS (Cross-Site Scripting) attack skill following the prompt-based pattern used by existing skills (SQLi, DoS, etc.). Backend changes: - Add xss_prompts.py with 7-step Dalfox workflow including: - Step 1: Target analysis with execute_curl - Step 2: Quick Dalfox detection scan - Step 3: WAF detection and bypass techniques - Step 4: Exploitation (reflected, stored, DOM, blind) - Step 5: Long scan mode for complex targets - Step 6: Payload generation priority - Step 7: Evidence collection - Add OOB blind XSS workflow using Interactsh callbacks - Add XSS payload reference with bypass techniques - Register 'xss' in KNOWN_ATTACK_PATHS and classification - Add XSS settings: workers, timeout, WAF bypass, deep DOM - Wire XSS routing in prompts/__init__.py Frontend changes: - Add XssSection.tsx UI component for settings - Add XSS to BUILT_IN_SKILLS in AttackSkillsSection.tsx - Add xss* fields to Prisma schema Uses existing tools (kali_shell -> dalfox, execute_curl) - no new MCP servers required. Inspired-by: samugit83#72 (Shafranpackeer/xss-attack-module) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Document planned attack skills following prompt-based pattern: - Priority 1: SSRF, Command Injection, SSTI - Priority 2: NoSQL Injection, XXE, LFI/RFI - Priority 3: JWT, GraphQL, WebSocket attacks - Priority 4: Deserialization, HTTP Smuggling Includes implementation pattern and references. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Add XSS (Cross-Site Scripting) attack skill following the same prompt-based pattern as SQLi.
Features:
WAF Bypass Techniques:
<script>)\x3c,\u003c)%253C)<ScRiPt>)<scri%00pt>)<scr<!---->ipt>)Blind XSS with OOB Callbacks:
--blindflag supportType of Change
Component(s)
How to Test
Checklist
Screenshots
N/A - Backend prompts + settings UI, no major visual changes
Related Issues
Follows same pattern as SQLi skill implementation