system_context dict | codebase_snapshot dict | task_type stringclasses 2
values | red_team dict | blue_team dict | coding dict | reasoning_trace stringlengths 26 152 | outcome dict |
|---|---|---|---|---|---|---|---|
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-041344",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_1d86"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.47
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-6c4ce7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_0137"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_fd0516",
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.exploit_fd0516 -> target_system.exploit_fd0516 -> target_system.patch_e28172 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.35
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-8979de",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_e649"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_d8222a | {
"severity": "High",
"success": true,
"time_to_detect": 3.25
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-97be3e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_6b56"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.64
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-94bad2",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_6077"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.exploit_28b139 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 4.05
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-f638f8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_1d7a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.65
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-95178f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_a23f"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.exploit_28b139 -> target_system.patch_d8222a -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.43
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-d633a0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_3bbc"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.58
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-c821ba",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SSRF",
"impact": "Data Exfiltration",
"payloads": [
"payload_71bb"
],
"steps": [
"target_system.exploit_28b139",
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_28b139 -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.exploit_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 0.49
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-2baffa",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_33ef"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 5
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-7db7a5",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_50be"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_9a13ca",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_9a13ca -> target_system.exploit_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.44
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-932d9f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SSRF",
"impact": "Data Exfiltration",
"payloads": [
"payload_40ec"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.exploit_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 0.17
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-20e450",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_ed96"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_d8222a",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 0.22
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-d11bc9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_6341"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 4.18
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-144efe",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_7184"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.17
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-123e76",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_14c2"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 4.58
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-4deef7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_4e8e"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_9a13ca",
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 -> target_system.exploit_9a13ca -> target_system.patch_fd0516 -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.44
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-2e7ad3",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_b3e6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.24
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-21edb2",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_b959"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.52
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-257f1b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_f629"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.exploit_28b139 -> target_system.patch_fd0516 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.03
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-0f2cce",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_7ccd"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.52
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-cc86cc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_83f3"
],
"steps": [
"target_system.exploit_031983",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_d8222a -> target_system.exploit_031983 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.56
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-c1f66d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_db47"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.76
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-fc9783",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_d1bf"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.exploit_9a13ca -> target_system.patch_fd0516 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.96
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-32b351",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_b903"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.99
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-849767",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_1ed9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.85
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-f2ec4e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_b310"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_d8222a",
"target_system.patch_031983",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.exploit_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_e28172 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.12
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-df1133",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_9d7a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.73
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-ba5e1b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_832a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.62
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-cfc48c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_1ee9"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.exploit_e28172 -> target_system.patch_fd0516 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.28
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-94bae8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "XSS",
"impact": "Data Exfiltration",
"payloads": [
"payload_d532"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_420cc4",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.patch_28b139 -> target_system.exploit_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.51
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-c5517c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_5ea6"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.scan_99914b -> target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.98
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-1bd682",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_f937"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.47
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-2f4159",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_1a7e"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.09
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-e41a4d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_d0cd"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_9a13ca",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.patch_d8222a | {
"severity": "High",
"success": true,
"time_to_detect": 0.75
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-1c8c4f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_0b73"
],
"steps": [
"target_system.exploit_d8222a",
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.exploit_d8222a -> target_system.exploit_d8222a -> target_system.patch_fd0516 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.26
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-572fdf",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Insecure Deserialization",
"impact": "Data Exfiltration",
"payloads": [
"payload_0707"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.exploit_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.37
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-d9bc05",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_59db"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.88
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-17ff47",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_086c"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.25
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-c41e86",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_1e10"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_fd0516 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 3.55
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-987e01",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_2989"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.61
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-c7f5fa",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_7179"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.58
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-8603ef",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_b4e4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.96
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-1570b2",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_0b26"
],
"steps": [
"target_system.exploit_031983",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.exploit_031983 -> target_system.exploit_031983 -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.34
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-07a8b4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_56ea"
],
"steps": [
"target_system.exploit_28b139",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.32
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-204f22",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_0b95"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.exploit_420cc4 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.38
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-09806b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_13fb"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.17
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-508120",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_6eff"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.06
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-bbb5b4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_30a0"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.4
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-724b42",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_7d0f"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.19
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-50fe01",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Broken Auth",
"impact": "Data Exfiltration",
"payloads": [
"payload_a61c"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_d8222a -> target_system.exploit_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.17
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-a463f0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_7707"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.48
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-264c2d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_b80f"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.44
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-669ffb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_8db1"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.79
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-f2b4d0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_a2f1"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.75
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-d487be",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_d1e8"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.62
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-269a89",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_98c0"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.45
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-83d980",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_c9c0"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_28b139 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.44
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-9875f7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_905d"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.88
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-4c312f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_d492"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_031983 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.88
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-2aed80",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_50f9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.46
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-e923ac",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_6477"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.6
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-689192",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_fef9"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.34
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-b0a4d9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_89c5"
],
"steps": [
"target_system.exploit_d8222a",
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_d8222a -> target_system.exploit_d8222a -> target_system.exploit_d8222a -> target_system.patch_28b139 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.94
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-d2ffea",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_2618"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.73
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-4dd050",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_c897"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_9a13ca -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.28
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-e5d50f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_d059"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.17
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-00398f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_68b2"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.exploit_fd0516 -> target_system.patch_28b139 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.93
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-f6b4bd",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Broken Auth",
"impact": "Data Exfiltration",
"payloads": [
"payload_1f64"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_d8222a -> target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.exploit_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.98
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-f58fa7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_2a19"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_031983",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.18
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-55266b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_2f11"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.5
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-cd8a5e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_aff6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.5
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-aaa64d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_0fc7"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.63
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-707ae5",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_86a8"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_d8222a",
"target_system.patch_420cc4",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.74
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-1c3e63",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_18ab"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 1.44
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-abb1d4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_c188"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.12
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-f3b43c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_a856"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_9a13ca -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_d8222a | {
"severity": "High",
"success": true,
"time_to_detect": 4.2
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-faedc9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_19ed"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.67
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-8f3bdd",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_a1af"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.85
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-50ca91",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_c438"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.93
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-2b925a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_75d1"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.18
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-7ec740",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_349c"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.97
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-0b5f17",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_e273"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.scan_99914b",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_fd0516 -> target_system.scan_99914b -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.49
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-2c35fd",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_2e43"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 2.53
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-02ae96",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_aba8"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.exploit_031983 -> target_system.patch_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.96
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-dfb0ec",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_7420"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.55
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-b67fbb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_2326"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.exploit_031983 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.5
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-0a0b36",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_a866"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.78
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-9eed06",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_d40b"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.exploit_9a13ca -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.71
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-56da19",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_16aa"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_d8222a -> target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 2.48
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-ead106",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_4403"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.74
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-180844",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_b42b"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.exploit_420cc4 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.95
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-faf954",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_2af2"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.52
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-968156",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_0fbb"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.67
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-ad1beb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_2ed8"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.31
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-3cf86a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_f69e"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.16
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-de0066",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_2aee"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.96
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-948f20",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_7081"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.26
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-21dc97",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_9961"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.84
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-0e6e08",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Broken Auth",
"impact": "Data Exfiltration",
"payloads": [
"payload_13ac"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.exploit_e28172 -> target_system.patch_031983 -> target_system.exploit_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 4.14
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.