-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy path.env.example
More file actions
70 lines (57 loc) · 1.87 KB
/
.env.example
File metadata and controls
70 lines (57 loc) · 1.87 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
# Claude API Configuration
ANTHROPIC_API_KEY=sk-ant-...
# Authorization (CRITICAL - Security Control)
AUTHORIZED_TARGETS=10.10.10.3,192.168.1.0/24
SCAN_AUTHORIZATION_TOKEN=SEC-20251220-TENCENT-AH
# Database Configuration
DATABASE_PATH=./data/audit.db
DATABASE_TYPE=sqlite
# Logging Configuration
LOG_LEVEL=info
LOG_PATH=./logs
AUDIT_LOG_RETENTION_DAYS=365
# Rate Limiting
EXPLOIT_DB_MAX_REQUESTS_PER_MINUTE=10
NMAP_MAX_CONCURRENT_SCANS=3
# Tool Paths (adjust for your system)
NMAP_PATH=/usr/bin/nmap
DIRBUSTER_PATH=/usr/bin/dirb
METASPLOIT_PATH=/usr/bin/msfconsole
SEARCHSPLOIT_PATH=/usr/bin/searchsploit
# Agent Configuration
AGENT_MODEL=claude-opus-4-5-20251101
AGENT_MAX_TURNS=50
AGENT_MAX_BUDGET_USD=25.00
PERMISSION_MODE=default
# Monitoring Server Configuration
MONITOR_PORT=3000
ENABLE_MONITORING=true
# PoC Database Configuration
POC_DATABASE_PATH=./data/poc-database.db
# Parallel Execution Configuration
MAX_CONCURRENT_TOOLS=5
TOOL_TIMEOUT_MS=300000
# Machine Learning Configuration (Phase 4)
ML_MODEL_PATH=./models/vuln-predictor.json
ENABLE_ML_PREDICTIONS=false
# RAG Knowledge System Configuration (Phase 5)
# Set to "true" to enable RAG-based knowledge retrieval from writeups
# When enabled, agent can search past writeups for exploitation techniques
ENABLE_RAG=false
KNOWLEDGE_DATABASE_PATH=./data/knowledge.db
# Hybrid Model Agent Configuration
# Execution mode: "full" = complete execution, "plan_only" = stop at attack plan (HITL)
HYBRID_MODE=full
# Max standard exploit attempts before fallback to custom exploit
MAX_EXPLOIT_ATTEMPTS=3
# Max custom exploit attempts before termination
MAX_CUSTOM_EXPLOIT_ATTEMPTS=3
# Attacker IP for reverse shells (used in exploitation)
LHOST=
# Attacker port for reverse shells
LPORT=4444
# Additional Tool Paths (Phase 2-4)
TESTSSL_PATH=/usr/local/bin/testssl.sh
SQLMAP_PATH=/usr/bin/sqlmap
NUCLEI_PATH=/usr/bin/nuclei
HYDRA_PATH=/usr/bin/hydra