Feat: Add BuildVuln Engine for Automated Vulnerability Lab Creation#21192
Feat: Add BuildVuln Engine for Automated Vulnerability Lab Creation#21192Ganesh-abc wants to merge 9 commits intorapid7:masterfrom
Conversation
|
This looks suspiciously like the GSoC project which has not had a proposal picked. I would highly recommend avoiding putting time into a project before a proposal is picked. Jumping the gun does not help increase your odds of having your proposal selected. |
|
Thanks for the guidance — this PR is intended as an early architecture prototype to gather feedback before submitting the GSoC proposal. I'll avoid further large changes until the proposal selection phase and instead focus on refining the design and documentation. Appreciate the feedback and looking forward to suggestions on the architecture direction. |
|
Thanks for the feedback! This work is part of my Google Summer of Code proposal for a BuildVuln Engine to provide automated vulnerability lab environments within Metasploit. Proposal Draft: Architecture Draft: Implementation Plan: This PR is intended as an early prototype to gather architectural feedback before the GSoC proposal selection. I'll avoid expanding the feature further for now and instead focus on refining based on maintainer guidance. Would maintainers prefer this functionality implemented as:
Appreciate the guidance and feedback! |
65fab46 to
6f9ce83
Compare
Summary
This PR introduces a prototype implementation of a BuildVuln engine for automating Docker-based vulnerable environments within Metasploit.
The goal is to provide repeatable, isolated vulnerability labs for exploit development and testing.
Key Features
Prototype Implementation
A Vim Modeline RCE lab was implemented to validate:
Verification
Steps to test:
Notes
This is an early prototype to validate architecture for the proposed build_vuln feature for GSoC.
Feedback on architecture and integration approach is welcome.
Update:
Added fail-safe cleanup logic using Ruby ensure block.
Verified container teardown during Ctrl+C interruption.
This prevents orphan containers and improves framework stability.