system_context
dict
codebase_snapshot
dict
task_type
stringclasses
2 values
red_team
dict
blue_team
dict
coding
dict
reasoning_trace
stringlengths
26
152
outcome
dict
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-00c157", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_41ba" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.scan_99914b", "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.scan_99914b -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_d8222a
{ "severity": "Critical", "success": true, "time_to_detect": 3.99 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-0715a4", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_4547" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.03 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-c1e2c7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_7df4" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 4.26 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-bb3640", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_0544" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 0.2 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-a6ebb1", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SQL Injection", "impact": "Data Exfiltration", "payloads": [ "payload_4481" ], "steps": [ "target_system.exploit_28b139", "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_d8222a", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_28b139 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.exploit_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 0.72 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-07c615", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_5610" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 0.53 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-50d656", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_9e5a" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 3.2 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-9c2acc", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_264c" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.48 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-9d32b4", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_bf95" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_420cc4", "target_system.patch_9a13ca", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 2.3 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-482436", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_04d2" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_420cc4", "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 4.42 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-39b94c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_d463" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 0.59 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-343394", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_08c5" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_e28172", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_d8222a
{ "severity": "Critical", "success": true, "time_to_detect": 4.88 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-5f55e5", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_3620" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.exploit_420cc4 -> target_system.patch_e28172
{ "severity": "Medium", "success": true, "time_to_detect": 2.6 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-aa267a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_a88f" ], "steps": [ "target_system.exploit_e28172", "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 4.59 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-0a70bb", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_5d53" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_e28172", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_e28172 -> target_system.patch_d8222a
{ "severity": "Critical", "success": true, "time_to_detect": 1.07 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-762f08", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_0705" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_420cc4 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.45 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-fb8c77", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_5a32" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 4.71 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-500919", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_ff78" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 3.6 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-1d2ec2", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_8168" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_031983", "target_system.patch_e28172", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_fd0516
{ "severity": "Medium", "success": true, "time_to_detect": 1.73 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-6d9898", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_3c42" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 0.11 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-270b46", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_6a7e" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_d8222a
{ "severity": "High", "success": true, "time_to_detect": 2.37 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-a10e74", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "XSS", "impact": "Data Exfiltration", "payloads": [ "payload_19bf" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 4.82 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-2559da", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SSRF", "impact": "Data Exfiltration", "payloads": [ "payload_f19c" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.exploit_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.6 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-76b7ca", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_ae7a" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "None", "response_steps": [], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172
{ "severity": "High", "success": true, "time_to_detect": 0.17 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-d341ce", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_648f" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_420cc4", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 3.49 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-e3a760", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_80fb" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 4.07 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-3d90e3", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_1b1e" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.26 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-ff9715", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Broken Auth", "impact": "Data Exfiltration", "payloads": [ "payload_02e5" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.27 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-78c0df", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_61b7" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 3.24 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-b620d2", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_96e3" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.67 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-5052c8", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_818e" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_420cc4", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.21 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-4fd604", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_db88" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.08 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-a2ca29", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_b2dc" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.57 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-578e7f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_27d7" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_420cc4", "target_system.patch_9a13ca", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.exploit_fd0516 -> target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 3.52 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-e040b7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_3c1a" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 4.66 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-e8825c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_0770" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_9a13ca", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_420cc4
{ "severity": "Critical", "success": true, "time_to_detect": 3.41 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-a841d6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_c6eb" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.18 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-7ddf7e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_895d" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_420cc4
{ "severity": "High", "success": true, "time_to_detect": 2.98 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-20308b", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_911d" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.1 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-68b02c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_bb75" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_9a13ca", "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_031983 -> target_system.exploit_9a13ca -> target_system.exploit_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 1.78 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-771073", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_72af" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 4.82 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-3e67aa", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_2820" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_9a13ca", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 3.45 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-494b04", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_74ef" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_9a13ca
{ "severity": "Medium", "success": true, "time_to_detect": 3.16 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-c77d3a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_9914" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_031983", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 3.18 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-ca43c9", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_6d1b" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_d8222a", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.47 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-972458", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_63a4" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 1.17 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-aa0dc8", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_66d1" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_9a13ca
{ "severity": "Medium", "success": true, "time_to_detect": 3.96 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-372361", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_8e18" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.01 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-0e811c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_f881" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_e28172", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 3.64 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-005111", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SSRF", "impact": "Data Exfiltration", "payloads": [ "payload_af3c" ], "steps": [ "target_system.exploit_28b139", "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.exploit_28b139 -> target_system.exploit_28b139
{ "severity": "High", "success": true, "time_to_detect": 2.73 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-acad2a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_ae96" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 3.4 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-bfca48", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SSRF", "impact": "Data Exfiltration", "payloads": [ "payload_dcfd" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_d8222a", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.exploit_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.26 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-3716e4", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_ee87" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 4.49 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-892ee6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_3c7e" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_e28172", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.patch_e28172 -> target_system.patch_031983
{ "severity": "Medium", "success": true, "time_to_detect": 3.07 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-caf6e6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_23cd" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 0.73 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-444e8d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_c7bb" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-da893f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_b489" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_fd0516", "target_system.patch_fd0516", "target_system.patch_420cc4", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_420cc4
{ "severity": "Critical", "success": true, "time_to_detect": 1.32 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-fb3c1a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_820e" ], "steps": [ "target_system.exploit_9a13ca", "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.exploit_e28172 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_420cc4
{ "severity": "High", "success": true, "time_to_detect": 2.01 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-cc5ec7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_0819" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_28b139", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.07 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-58939e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_ccb0" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 3.57 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-78eaba", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_45f7" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 4.82 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-c3647b", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_f306" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 0.16 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-7f2ada", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_fbbb" ], "steps": [ "target_system.exploit_e28172", "target_system.exploit_031983", "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.exploit_031983 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.97 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-467d26", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_8cd6" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 2.52 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-968629", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_bd5f" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.22 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-72f632", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_7c7f" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 4.93 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-6bbb94", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_070c" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 0.27 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-7de3cc", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_f86d" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_d8222a", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.exploit_fd0516 -> target_system.patch_d8222a -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 1.62 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-456038", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_bda2" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_28b139
{ "severity": "Critical", "success": true, "time_to_detect": 3.65 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-4818ad", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Buffer Overflow", "impact": "Data Exfiltration", "payloads": [ "payload_35dc" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.exploit_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.62 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-a41e49", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_a008" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 3.41 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-d72be4", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_f287" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_28b139 -> target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_d8222a
{ "severity": "High", "success": true, "time_to_detect": 4.23 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-4fc14b", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SSRF", "impact": "Data Exfiltration", "payloads": [ "payload_275d" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.exploit_28b139
{ "severity": "High", "success": true, "time_to_detect": 0.44 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-948acb", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_407c" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_9a13ca", "target_system.patch_9a13ca", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.01 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-b6729e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_ad92" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.patch_031983
{ "severity": "Medium", "success": true, "time_to_detect": 3.32 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-b4b653", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_8e88" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.scan_99914b", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.scan_99914b -> target_system.patch_fd0516
{ "severity": "High", "success": true, "time_to_detect": 1.36 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-e50b82", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_95b3" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.72 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-3f8d01", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_78a9" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_d8222a -> target_system.exploit_9a13ca -> target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 1.47 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-553cb3", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Broken Auth", "impact": "Data Exfiltration", "payloads": [ "payload_685f" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_d8222a", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.exploit_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.99 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-0d3792", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_349d" ], "steps": [ "target_system.exploit_28b139", "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_031983", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_031983 -> target_system.exploit_28b139 -> target_system.exploit_28b139 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.94 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-c5d888", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Broken Auth", "impact": "Data Exfiltration", "payloads": [ "payload_2f34" ], "steps": [ "target_system.exploit_e28172", "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_28b139", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.exploit_e28172
{ "severity": "High", "success": true, "time_to_detect": 1.32 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-69e980", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_36f9" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 2.3 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-79d049", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_3ec8" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_9a13ca", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 4.37 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-a58e20", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SSRF", "impact": "Data Exfiltration", "payloads": [ "payload_86d2" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_fd0516 -> target_system.exploit_28b139
{ "severity": "High", "success": true, "time_to_detect": 4.09 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-d1df04", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_d3a7" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 1.68 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-59dace", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_21cb" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 1.28 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-f3ca6d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_74ab" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 0.5 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-49cda5", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_9c56" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.scan_99914b -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_031983
{ "severity": "High", "success": true, "time_to_detect": 1.96 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-6c5a58", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_a0b7" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_9a13ca", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_9a13ca -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 3.52 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-62edce", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_e4d8" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_fd0516", "target_system.patch_420cc4", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_9a13ca
{ "severity": "High", "success": true, "time_to_detect": 1.23 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-9416fa", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_cac4" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 2.96 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-c76fde", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_1755" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_9a13ca", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_28b139
{ "severity": "Medium", "success": true, "time_to_detect": 2.9 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-f85753", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_212f" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.exploit_031983 -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.81 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-f56d6a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_027d" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.68 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-afa3ac", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_1ec8" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_28b139", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 1.18 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-f300df", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_f9a9" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 0.77 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-f97c93", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "XSS", "impact": "Data Exfiltration", "payloads": [ "payload_c427" ], "steps": [ "target_system.exploit_fd0516", "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.exploit_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 1.54 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-3b6d18", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_a5b2" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 3.57 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-f908a6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_6dce" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.exploit_28b139 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 0.28 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-57fdde", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Buffer Overflow", "impact": "Data Exfiltration", "payloads": [ "payload_517b" ], "steps": [ "target_system.exploit_9a13ca", "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.exploit_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 0.23 }