-
-
Notifications
You must be signed in to change notification settings - Fork 911
Removing redundancy and cleaning profiles #1041
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Summary by CodeRabbit
WalkthroughRemoved and standardized profile tags across docs and module YAMLs: replaced information_gathering with info, removed brute_force from brute modules, removed wp and vulnerability tags from various WordPress/ vuln modules, and updated docs/examples to use new aliases and asset_discovery. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes 📜 Recent review detailsConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro 💡 Knowledge Base configuration:
You can enable these sources in your CodeRabbit configuration. 📒 Files selected for processing (2)
💤 Files with no reviewable changes (1)
🚧 Files skipped from review as they are similar to previous changes (1)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
✨ Finishing Touches🧪 Generate unit tests
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. CodeRabbit Commands (Invoked using PR/Issue comments)Type Other keywords and placeholders
Status, Documentation and Community
|
…1 and more relevant ones
ed29437
to
0d09819
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 2
📜 Review details
Configuration used: Path: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
💡 Knowledge Base configuration:
- MCP integration is disabled by default for public repositories
- Jira integration is disabled by default for public repositories
- Linear integration is disabled by default for public repositories
You can enable these sources in your CodeRabbit configuration.
📒 Files selected for processing (82)
docs/Usage.md
(4 hunks)nettacker/modules/brute/ftp.yaml
(0 hunks)nettacker/modules/brute/ftps.yaml
(0 hunks)nettacker/modules/brute/pop3.yaml
(0 hunks)nettacker/modules/brute/pop3s.yaml
(0 hunks)nettacker/modules/brute/smtp.yaml
(0 hunks)nettacker/modules/brute/smtps.yaml
(0 hunks)nettacker/modules/brute/ssh.yaml
(0 hunks)nettacker/modules/brute/telnet.yaml
(0 hunks)nettacker/modules/scan/icmp.yaml
(0 hunks)nettacker/modules/scan/port.yaml
(0 hunks)nettacker/modules/scan/subdomain.yaml
(0 hunks)nettacker/modules/scan/wordpress_version.yaml
(0 hunks)nettacker/modules/scan/wp_plugin.yaml
(0 hunks)nettacker/modules/scan/wp_theme.yaml
(0 hunks)nettacker/modules/scan/wp_timethumbs.yaml
(0 hunks)nettacker/modules/vuln/accela_cve_2021_34370.yaml
(0 hunks)nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml
(0 hunks)nettacker/modules/vuln/apache_cve_2021_41773.yaml
(0 hunks)nettacker/modules/vuln/apache_cve_2021_42013.yaml
(0 hunks)nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml
(0 hunks)nettacker/modules/vuln/apache_struts.yaml
(0 hunks)nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml
(0 hunks)nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml
(0 hunks)nettacker/modules/vuln/citrix_cve_2019_19781.yaml
(0 hunks)nettacker/modules/vuln/citrix_cve_2023_24488.yaml
(0 hunks)nettacker/modules/vuln/citrix_cve_2023_4966.yaml
(0 hunks)nettacker/modules/vuln/clickjacking.yaml
(0 hunks)nettacker/modules/vuln/cloudron_cve_2021_40868.yaml
(0 hunks)nettacker/modules/vuln/confluence_cve_2023_22515.yaml
(0 hunks)nettacker/modules/vuln/confluence_cve_2023_22527.yaml
(0 hunks)nettacker/modules/vuln/content_security_policy.yaml
(0 hunks)nettacker/modules/vuln/content_type_options.yaml
(0 hunks)nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml
(0 hunks)nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml
(0 hunks)nettacker/modules/vuln/f5_cve_2020_5902.yaml
(0 hunks)nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml
(0 hunks)nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml
(0 hunks)nettacker/modules/vuln/grafana_cve_2021_43798.yaml
(0 hunks)nettacker/modules/vuln/graphql.yaml
(1 hunks)nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml
(0 hunks)nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml
(0 hunks)nettacker/modules/vuln/http_cookie.yaml
(0 hunks)nettacker/modules/vuln/http_cors.yaml
(0 hunks)nettacker/modules/vuln/http_options_enabled.yaml
(0 hunks)nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml
(0 hunks)nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml
(0 hunks)nettacker/modules/vuln/justwirting_cve_2021_41878.yaml
(0 hunks)nettacker/modules/vuln/log4j_cve_2021_44228.yaml
(0 hunks)nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml
(0 hunks)nettacker/modules/vuln/msexchange_cve_2021_26855.yaml
(0 hunks)nettacker/modules/vuln/msexchange_cve_2021_34473.yaml
(0 hunks)nettacker/modules/vuln/novnc_cve_2021_3654.yaml
(0 hunks)nettacker/modules/vuln/omigod_cve_2021_38647.yaml
(0 hunks)nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml
(0 hunks)nettacker/modules/vuln/payara_cve_2021_41381.yaml
(0 hunks)nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml
(0 hunks)nettacker/modules/vuln/placeos_cve_2021_41826.yaml
(0 hunks)nettacker/modules/vuln/prestashop_cve_2021_37538.yaml
(0 hunks)nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml
(0 hunks)nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml
(0 hunks)nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml
(0 hunks)nettacker/modules/vuln/server_version.yaml
(0 hunks)nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml
(0 hunks)nettacker/modules/vuln/strict_transport_security.yaml
(0 hunks)nettacker/modules/vuln/subdomain_takeover.yaml
(0 hunks)nettacker/modules/vuln/teamcity_cve_2024_27198.yaml
(0 hunks)nettacker/modules/vuln/tieline_cve_2021_35336.yaml
(0 hunks)nettacker/modules/vuln/tjws_cve_2021_37573.yaml
(0 hunks)nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml
(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml
(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml
(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml
(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml
(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml
(0 hunks)nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml
(0 hunks)nettacker/modules/vuln/wp_xmlrpc_dos.yaml
(0 hunks)nettacker/modules/vuln/wp_xmlrpc_pingback.yaml
(0 hunks)nettacker/modules/vuln/x_powered_by.yaml
(0 hunks)nettacker/modules/vuln/x_xss_protection.yaml
(0 hunks)nettacker/modules/vuln/xdebug_rce.yaml
(0 hunks)nettacker/modules/vuln/zoho_cve_2021_40539.yaml
(0 hunks)
💤 Files with no reviewable changes (80)
- nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml
- nettacker/modules/scan/icmp.yaml
- nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml
- nettacker/modules/brute/telnet.yaml
- nettacker/modules/brute/ftp.yaml
- nettacker/modules/vuln/tjws_cve_2021_37573.yaml
- nettacker/modules/vuln/payara_cve_2021_41381.yaml
- nettacker/modules/vuln/accela_cve_2021_34370.yaml
- nettacker/modules/vuln/strict_transport_security.yaml
- nettacker/modules/vuln/zoho_cve_2021_40539.yaml
- nettacker/modules/vuln/wp_xmlrpc_dos.yaml
- nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml
- nettacker/modules/vuln/justwirting_cve_2021_41878.yaml
- nettacker/modules/vuln/content_type_options.yaml
- nettacker/modules/brute/smtp.yaml
- nettacker/modules/vuln/apache_cve_2021_41773.yaml
- nettacker/modules/vuln/apache_cve_2021_42013.yaml
- nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml
- nettacker/modules/vuln/citrix_cve_2023_4966.yaml
- nettacker/modules/vuln/http_cookie.yaml
- nettacker/modules/vuln/wp_xmlrpc_pingback.yaml
- nettacker/modules/brute/pop3s.yaml
- nettacker/modules/vuln/tieline_cve_2021_35336.yaml
- nettacker/modules/vuln/citrix_cve_2023_24488.yaml
- nettacker/modules/vuln/subdomain_takeover.yaml
- nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml
- nettacker/modules/vuln/server_version.yaml
- nettacker/modules/vuln/confluence_cve_2023_22515.yaml
- nettacker/modules/scan/wordpress_version.yaml
- nettacker/modules/vuln/prestashop_cve_2021_37538.yaml
- nettacker/modules/vuln/xdebug_rce.yaml
- nettacker/modules/brute/ssh.yaml
- nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml
- nettacker/modules/vuln/msexchange_cve_2021_26855.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml
- nettacker/modules/scan/subdomain.yaml
- nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml
- nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml
- nettacker/modules/brute/pop3.yaml
- nettacker/modules/vuln/apache_struts.yaml
- nettacker/modules/vuln/http_options_enabled.yaml
- nettacker/modules/vuln/citrix_cve_2019_19781.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml
- nettacker/modules/vuln/msexchange_cve_2021_34473.yaml
- nettacker/modules/vuln/content_security_policy.yaml
- nettacker/modules/vuln/grafana_cve_2021_43798.yaml
- nettacker/modules/vuln/teamcity_cve_2024_27198.yaml
- nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml
- nettacker/modules/scan/wp_theme.yaml
- nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml
- nettacker/modules/scan/port.yaml
- nettacker/modules/scan/wp_plugin.yaml
- nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml
- nettacker/modules/vuln/f5_cve_2020_5902.yaml
- nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml
- nettacker/modules/vuln/http_cors.yaml
- nettacker/modules/vuln/x_xss_protection.yaml
- nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml
- nettacker/modules/scan/wp_timethumbs.yaml
- nettacker/modules/brute/smtps.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml
- nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml
- nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml
- nettacker/modules/vuln/clickjacking.yaml
- nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml
- nettacker/modules/brute/ftps.yaml
- nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml
- nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml
- nettacker/modules/vuln/omigod_cve_2021_38647.yaml
- nettacker/modules/vuln/log4j_cve_2021_44228.yaml
- nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml
- nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml
- nettacker/modules/vuln/confluence_cve_2023_22527.yaml
- nettacker/modules/vuln/novnc_cve_2021_3654.yaml
- nettacker/modules/vuln/placeos_cve_2021_41826.yaml
- nettacker/modules/vuln/cloudron_cve_2021_40868.yaml
- nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml
- nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml
- nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml
- nettacker/modules/vuln/x_powered_by.yaml
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
- GitHub Check: Test Docker 27.5.0-1
ubuntu.24.04noble image build - GitHub Check: Test Docker 26.0.0-1
ubuntu.24.04noble image build - GitHub Check: Test Docker 26.1.4-1
ubuntu.24.04noble image build - GitHub Check: Build package
- GitHub Check: Test Docker image
🔇 Additional comments (3)
docs/Usage.md (3)
84-85
: Profiles list: brute_force removed, brute retained — looks good.
232-233
: Farsi help profiles updated (brute retained) — looks good.
414-450
: Docs output showsgraphql_vuln
withoutinfo
— align the module YAML accordingly.This matches expected taxonomy (vuln-only). Ensure
nettacker/modules/vuln/graphql.yaml
does not includeinfo
.
Cleaning the profiles list, as mentioned in #1038. The following changes were made
vulnerability
from all of them because it was a subset ofvuln
and vuln is easier to typebrute-force
as its the same asbrute
and brute is better.puneethreddyrc
profileinfo
andinformation-gathering
, keeping it consistent and non-redundant.wp
andwordpress
, keeping it consistent and non-redudant.infortmation
Your PR description goes here.
Type of change
Checklist
make pre-commit
, it didn't generate any changesmake test
, all tests passed locally