Conversation
Overhauls the entire pentest playbook and all 9 templates (+ agent prompts) to mandate active exploitation, data extraction, and demonstrated impact rather than just vulnerability detection. Key changes: - Playbook: Added authorized operations context, exploitation decision tree, exploitation-by-vuln-class table, extracted data inventory section, and lateral movement requirements - All templates: Added pre-authorization context, exploitation phases with specific instructions per vuln class (SQLi extraction, RCE proof commands, LFI file reads, IDOR data comparison, credential reuse testing) - Templates now require "Extracted Data Inventory" section in reports showing DB rows, credentials, files read, tokens/secrets obtained - vuln-assessment: Removed "do not exploit beyond safe checks" — replaced with full exploitation mandate - Agent prompts: Updated ingestion/processing/synthesis agents to preserve exploitation evidence and extracted data through the pipeline - All guidelines sections updated to emphasize "show the data, not describe it" https://claude.ai/code/session_019BHf7EGPVV9RzYnYScnkcM
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR fundamentally reframes the blhackbox penetration testing framework from a vulnerability detection and validation tool to an active exploitation and impact demonstration platform. All playbooks, templates, and agent prompts have been updated to mandate that vulnerabilities be exploited, data be extracted, and real-world impact be proven — not just detected.
Key Changes
Core Playbook Updates
Template Updates (all 8 templates)
Agent Prompt Updates
Template README
Notable Implementation Details
Exploitation is now mandatory, not optional — every vulnerability discovered must be exploited; findings without exploitation evidence are downgraded to "info" severity
Data extraction is the proof of impact — the framework now requires actual extracted data (database rows, file contents, credentials, tokens, command output) to be captured and included in evidence fields
Lateral movement and credential reuse testing — all templates now mandate testing discovered credentials against all other discovered services to map the full blast radius
Specific exploitation requirements per vulnerability class — detailed tables specify exactly what must be extracted/demonstrated for SQL injection, XSS, RCE, LFI, SSRF, auth bypass, IDOR, etc.
Evidence preservation throughout pipeline — ingestion, processing, and synthesis agents are explicitly instructed to preserve exploitation evidence and extracted data intact, not compress or discard it
Authorization context — all templates and playbooks now explicitly state that targets have "explicit written authorization" for "active exploitation, data extraction, credential harvesting, and post-exploitation activities"
https://claude.ai/code/session_019BHf7EGPVV9RzYnYScnkcM