system_context dict | codebase_snapshot dict | task_type stringclasses 2
values | red_team dict | blue_team dict | coding dict | reasoning_trace stringlengths 26 152 | outcome dict |
|---|---|---|---|---|---|---|---|
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-40ef0a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_a10a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.92
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-9baa32",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_1127"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.49
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-4cdfb6",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SSRF",
"impact": "Data Exfiltration",
"payloads": [
"payload_733f"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.exploit_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.59
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-1bb543",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SQL Injection",
"impact": "Data Exfiltration",
"payloads": [
"payload_4a28"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.exploit_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.92
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-73427a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_94ff"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.exploit_420cc4 -> target_system.patch_28b139 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.5
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-6dba32",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_b925"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.57
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-f94af7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_74f6"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.exploit_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.41
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-9a1719",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_0e84"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.64
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-357800",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_f583"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.59
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-dca506",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_9c93"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_420cc4 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.81
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-f80df9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_4830"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 2.69
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-c83c99",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_8074"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.64
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-aa6219",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_b0c1"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_28b139",
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.99
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-092f87",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_a7f9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.32
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-4a45ac",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_0299"
],
"steps": [
"target_system.exploit_9a13ca",
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.exploit_9a13ca -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.67
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-19f106",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_ebb7"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.4
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-41f677",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_72e6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.01
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-962e14",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_8a2d"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.34
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-67fb16",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_5ab4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.46
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-b219bb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_62c7"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_28b139",
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.56
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-527f8e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_6f7c"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.46
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-df9f19",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_7a27"
],
"steps": [
"target_system.exploit_9a13ca",
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_d8222a",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.exploit_9a13ca -> target_system.patch_d8222a -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.94
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-d417ac",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_d9cd"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.exploit_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.02
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-4293fb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_caf7"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.18
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-d322d0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_ad9e"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.38
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-f696e0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_7d83"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_420cc4 -> target_system.patch_9a13ca -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.51
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-a2f6e8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_3587"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_d8222a",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.46
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-695c0c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_458c"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 3.16
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-b623cb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_23a2"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.96
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-80e47f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_cdf4"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.5
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-c89362",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_b049"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_28b139",
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_d8222a -> target_system.patch_031983 -> target_system.patch_28b139 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.28
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-6eaf51",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_7296"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.89
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-8c3d30",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_b8f1"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.95
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-b692de",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_ed4c"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_d8222a | {
"severity": "High",
"success": true,
"time_to_detect": 4.08
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-9d8954",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_4024"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.exploit_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.89
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-80ce43",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_25c9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.86
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-87e61f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_c13d"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 4.28
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-2ad924",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_6df9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.64
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-168682",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_3f80"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_e28172",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_e28172 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.88
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-448844",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_649c"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.scan_99914b -> target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.71
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-7595f9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_1a98"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.73
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-36fdcf",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_0bdf"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.exploit_9a13ca -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.7
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-0a34b2",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_9c12"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.13
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-1d3a03",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_bd44"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.15
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-3fe649",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_70a8"
],
"steps": [
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.09
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-25dbad",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_f030"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.29
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-9f3648",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_1233"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_d8222a",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_d8222a -> target_system.patch_fd0516 -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.59
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-1d074b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_7236"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.8
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-f557cf",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_8d76"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.52
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-1e8654",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_6a01"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.exploit_fd0516 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.54
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-b64dbd",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_66af"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 1.57
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-03fe2d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_8e5b"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_420cc4",
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.exploit_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.37
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-631259",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_18da"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.exploit_28b139 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 2.68
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-d82318",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_d701"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.25
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-ecb15e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SQL Injection",
"impact": "Data Exfiltration",
"payloads": [
"payload_1249"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.exploit_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.4
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-78b422",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_21df"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.71
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-72ceb8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_5b02"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_28b139 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.76
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-c81217",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Insecure Deserialization",
"impact": "Data Exfiltration",
"payloads": [
"payload_88d9"
],
"steps": [
"target_system.exploit_e28172",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.exploit_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.45
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-741756",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_c389"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.23
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-57a968",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_040c"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_420cc4",
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.24
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-2818ce",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_c1aa"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.6
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-298a40",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_af62"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.97
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-19cec8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_82aa"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_d8222a | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.69
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-12685c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_c654"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.28
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-46292d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_a070"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_fd0516",
"target_system.patch_fd0516",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.91
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-520bec",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_6b15"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.43
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-ac1a3e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_5908"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.exploit_9a13ca -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.92
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-43cacf",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_4be8"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.86
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-1dc8f6",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_853e"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 1.92
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-5acc51",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_c20c"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.scan_99914b",
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_fd0516 -> target_system.scan_99914b -> target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.58
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-056e43",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_8eec"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_031983",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_031983 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.93
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-321efc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_0383"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_031983 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.63
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-ad3f24",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_04a1"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "High",
"success": true,
"time_to_detect": 0.9
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-11e1a3",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_5276"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.38
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-8f5f8d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_2ea3"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.34
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-c3727b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Broken Auth",
"impact": "Data Exfiltration",
"payloads": [
"payload_c63c"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_e28172",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.exploit_e28172 -> target_system.exploit_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.75
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-79dc72",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_d558"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_fd0516 | {
"severity": "High",
"success": true,
"time_to_detect": 1.76
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-f9effd",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_e837"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.35
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-b626af",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_5f50"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_28b139 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.84
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-40e473",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SQL Injection",
"impact": "Data Exfiltration",
"payloads": [
"payload_6903"
],
"steps": [
"target_system.exploit_28b139",
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.exploit_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.23
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-14ae52",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_2847"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.66
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-b91cd6",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_e03f"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.33
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-9155c3",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_c1ec"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.exploit_fd0516 -> target_system.patch_28b139 -> target_system.exploit_fd0516 -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.9
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-e257ff",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_adac"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.13
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-c5f438",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_e1ad"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.46
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-5ca345",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_3b0f"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.scan_99914b -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 1.16
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-06780e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_fd36"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_e28172 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.63
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-1b95ab",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_d64a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_e28172",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.64
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-8d5103",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_fb4a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.91
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-70c6d7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_a17e"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.07
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-25c62d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_79a3"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.exploit_9a13ca -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.41
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-fc143f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_a78b"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.36
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-c5c9c7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_9f68"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.exploit_e28172 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 4.08
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-093d73",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_44b4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.65
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-5c2a3a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_a9a6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_d8222a",
"target_system.patch_420cc4",
"target_system.patch_d8222a",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.patch_031983 | {
"severity": "High",
"success": true,
"time_to_detect": 4.36
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-d49c0e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_d1f4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.08
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-763dfc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_244d"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.91
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-e21a4f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_b4f1"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.65
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-d31bf2",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_ba65"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_d8222a",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_d8222a -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.73
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-110b3c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_2662"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.scan_99914b",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.scan_99914b -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 4.76
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.