Removing redundancy and cleaning profiles#1041
Conversation
Summary by CodeRabbit
WalkthroughRemoved and standardized profile tags across docs and module YAMLs: replaced information_gathering with info, removed brute_force from brute modules, removed wp and vulnerability tags from various WordPress/ vuln modules, and updated docs/examples to use new aliases and asset_discovery. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes 📜 Recent review detailsConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro 💡 Knowledge Base configuration:
You can enable these sources in your CodeRabbit configuration. 📒 Files selected for processing (2)
💤 Files with no reviewable changes (1)
🚧 Files skipped from review as they are similar to previous changes (1)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
✨ Finishing Touches🧪 Generate unit tests
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. CodeRabbit Commands (Invoked using PR/Issue comments)Type Other keywords and placeholders
Status, Documentation and Community
|
…1 and more relevant ones
ed29437 to
0d09819
Compare
There was a problem hiding this comment.
Actionable comments posted: 2
📜 Review details
Configuration used: Path: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
💡 Knowledge Base configuration:
- MCP integration is disabled by default for public repositories
- Jira integration is disabled by default for public repositories
- Linear integration is disabled by default for public repositories
You can enable these sources in your CodeRabbit configuration.
📒 Files selected for processing (82)
docs/Usage.md(4 hunks)nettacker/modules/brute/ftp.yaml(0 hunks)nettacker/modules/brute/ftps.yaml(0 hunks)nettacker/modules/brute/pop3.yaml(0 hunks)nettacker/modules/brute/pop3s.yaml(0 hunks)nettacker/modules/brute/smtp.yaml(0 hunks)nettacker/modules/brute/smtps.yaml(0 hunks)nettacker/modules/brute/ssh.yaml(0 hunks)nettacker/modules/brute/telnet.yaml(0 hunks)nettacker/modules/scan/icmp.yaml(0 hunks)nettacker/modules/scan/port.yaml(0 hunks)nettacker/modules/scan/subdomain.yaml(0 hunks)nettacker/modules/scan/wordpress_version.yaml(0 hunks)nettacker/modules/scan/wp_plugin.yaml(0 hunks)nettacker/modules/scan/wp_theme.yaml(0 hunks)nettacker/modules/scan/wp_timethumbs.yaml(0 hunks)nettacker/modules/vuln/accela_cve_2021_34370.yaml(0 hunks)nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml(0 hunks)nettacker/modules/vuln/apache_cve_2021_41773.yaml(0 hunks)nettacker/modules/vuln/apache_cve_2021_42013.yaml(0 hunks)nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml(0 hunks)nettacker/modules/vuln/apache_struts.yaml(0 hunks)nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml(0 hunks)nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml(0 hunks)nettacker/modules/vuln/citrix_cve_2019_19781.yaml(0 hunks)nettacker/modules/vuln/citrix_cve_2023_24488.yaml(0 hunks)nettacker/modules/vuln/citrix_cve_2023_4966.yaml(0 hunks)nettacker/modules/vuln/clickjacking.yaml(0 hunks)nettacker/modules/vuln/cloudron_cve_2021_40868.yaml(0 hunks)nettacker/modules/vuln/confluence_cve_2023_22515.yaml(0 hunks)nettacker/modules/vuln/confluence_cve_2023_22527.yaml(0 hunks)nettacker/modules/vuln/content_security_policy.yaml(0 hunks)nettacker/modules/vuln/content_type_options.yaml(0 hunks)nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml(0 hunks)nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml(0 hunks)nettacker/modules/vuln/f5_cve_2020_5902.yaml(0 hunks)nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml(0 hunks)nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml(0 hunks)nettacker/modules/vuln/grafana_cve_2021_43798.yaml(0 hunks)nettacker/modules/vuln/graphql.yaml(1 hunks)nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml(0 hunks)nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml(0 hunks)nettacker/modules/vuln/http_cookie.yaml(0 hunks)nettacker/modules/vuln/http_cors.yaml(0 hunks)nettacker/modules/vuln/http_options_enabled.yaml(0 hunks)nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml(0 hunks)nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml(0 hunks)nettacker/modules/vuln/justwirting_cve_2021_41878.yaml(0 hunks)nettacker/modules/vuln/log4j_cve_2021_44228.yaml(0 hunks)nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml(0 hunks)nettacker/modules/vuln/msexchange_cve_2021_26855.yaml(0 hunks)nettacker/modules/vuln/msexchange_cve_2021_34473.yaml(0 hunks)nettacker/modules/vuln/novnc_cve_2021_3654.yaml(0 hunks)nettacker/modules/vuln/omigod_cve_2021_38647.yaml(0 hunks)nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml(0 hunks)nettacker/modules/vuln/payara_cve_2021_41381.yaml(0 hunks)nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml(0 hunks)nettacker/modules/vuln/placeos_cve_2021_41826.yaml(0 hunks)nettacker/modules/vuln/prestashop_cve_2021_37538.yaml(0 hunks)nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml(0 hunks)nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml(0 hunks)nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml(0 hunks)nettacker/modules/vuln/server_version.yaml(0 hunks)nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml(0 hunks)nettacker/modules/vuln/strict_transport_security.yaml(0 hunks)nettacker/modules/vuln/subdomain_takeover.yaml(0 hunks)nettacker/modules/vuln/teamcity_cve_2024_27198.yaml(0 hunks)nettacker/modules/vuln/tieline_cve_2021_35336.yaml(0 hunks)nettacker/modules/vuln/tjws_cve_2021_37573.yaml(0 hunks)nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml(0 hunks)nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml(0 hunks)nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml(0 hunks)nettacker/modules/vuln/wp_xmlrpc_dos.yaml(0 hunks)nettacker/modules/vuln/wp_xmlrpc_pingback.yaml(0 hunks)nettacker/modules/vuln/x_powered_by.yaml(0 hunks)nettacker/modules/vuln/x_xss_protection.yaml(0 hunks)nettacker/modules/vuln/xdebug_rce.yaml(0 hunks)nettacker/modules/vuln/zoho_cve_2021_40539.yaml(0 hunks)
💤 Files with no reviewable changes (80)
- nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml
- nettacker/modules/scan/icmp.yaml
- nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml
- nettacker/modules/brute/telnet.yaml
- nettacker/modules/brute/ftp.yaml
- nettacker/modules/vuln/tjws_cve_2021_37573.yaml
- nettacker/modules/vuln/payara_cve_2021_41381.yaml
- nettacker/modules/vuln/accela_cve_2021_34370.yaml
- nettacker/modules/vuln/strict_transport_security.yaml
- nettacker/modules/vuln/zoho_cve_2021_40539.yaml
- nettacker/modules/vuln/wp_xmlrpc_dos.yaml
- nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml
- nettacker/modules/vuln/justwirting_cve_2021_41878.yaml
- nettacker/modules/vuln/content_type_options.yaml
- nettacker/modules/brute/smtp.yaml
- nettacker/modules/vuln/apache_cve_2021_41773.yaml
- nettacker/modules/vuln/apache_cve_2021_42013.yaml
- nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml
- nettacker/modules/vuln/citrix_cve_2023_4966.yaml
- nettacker/modules/vuln/http_cookie.yaml
- nettacker/modules/vuln/wp_xmlrpc_pingback.yaml
- nettacker/modules/brute/pop3s.yaml
- nettacker/modules/vuln/tieline_cve_2021_35336.yaml
- nettacker/modules/vuln/citrix_cve_2023_24488.yaml
- nettacker/modules/vuln/subdomain_takeover.yaml
- nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml
- nettacker/modules/vuln/server_version.yaml
- nettacker/modules/vuln/confluence_cve_2023_22515.yaml
- nettacker/modules/scan/wordpress_version.yaml
- nettacker/modules/vuln/prestashop_cve_2021_37538.yaml
- nettacker/modules/vuln/xdebug_rce.yaml
- nettacker/modules/brute/ssh.yaml
- nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml
- nettacker/modules/vuln/msexchange_cve_2021_26855.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml
- nettacker/modules/scan/subdomain.yaml
- nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml
- nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml
- nettacker/modules/brute/pop3.yaml
- nettacker/modules/vuln/apache_struts.yaml
- nettacker/modules/vuln/http_options_enabled.yaml
- nettacker/modules/vuln/citrix_cve_2019_19781.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml
- nettacker/modules/vuln/msexchange_cve_2021_34473.yaml
- nettacker/modules/vuln/content_security_policy.yaml
- nettacker/modules/vuln/grafana_cve_2021_43798.yaml
- nettacker/modules/vuln/teamcity_cve_2024_27198.yaml
- nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml
- nettacker/modules/scan/wp_theme.yaml
- nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml
- nettacker/modules/scan/port.yaml
- nettacker/modules/scan/wp_plugin.yaml
- nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml
- nettacker/modules/vuln/f5_cve_2020_5902.yaml
- nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml
- nettacker/modules/vuln/http_cors.yaml
- nettacker/modules/vuln/x_xss_protection.yaml
- nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml
- nettacker/modules/scan/wp_timethumbs.yaml
- nettacker/modules/brute/smtps.yaml
- nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml
- nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml
- nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml
- nettacker/modules/vuln/clickjacking.yaml
- nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml
- nettacker/modules/brute/ftps.yaml
- nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml
- nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml
- nettacker/modules/vuln/omigod_cve_2021_38647.yaml
- nettacker/modules/vuln/log4j_cve_2021_44228.yaml
- nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml
- nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml
- nettacker/modules/vuln/confluence_cve_2023_22527.yaml
- nettacker/modules/vuln/novnc_cve_2021_3654.yaml
- nettacker/modules/vuln/placeos_cve_2021_41826.yaml
- nettacker/modules/vuln/cloudron_cve_2021_40868.yaml
- nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml
- nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml
- nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml
- nettacker/modules/vuln/x_powered_by.yaml
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
- GitHub Check: Test Docker 27.5.0-1
ubuntu.24.04noble image build - GitHub Check: Test Docker 26.0.0-1
ubuntu.24.04noble image build - GitHub Check: Test Docker 26.1.4-1
ubuntu.24.04noble image build - GitHub Check: Build package
- GitHub Check: Test Docker image
🔇 Additional comments (3)
docs/Usage.md (3)
84-85: Profiles list: brute_force removed, brute retained — looks good.
232-233: Farsi help profiles updated (brute retained) — looks good.
414-450: Docs output showsgraphql_vulnwithoutinfo— align the module YAML accordingly.This matches expected taxonomy (vuln-only). Ensure
nettacker/modules/vuln/graphql.yamldoes not includeinfo.
Cleaning the profiles list, as mentioned in #1038. The following changes were made
vulnerabilityfrom all of them because it was a subset ofvulnand vuln is easier to typebrute-forceas its the same asbruteand brute is better.puneethreddyrcprofileinfoandinformation-gathering, keeping it consistent and non-redundant.wpandwordpress, keeping it consistent and non-redudant.infortmationYour PR description goes here.
Type of change
Checklist
make pre-commit, it didn't generate any changesmake test, all tests passed locally