exploit_attempt
Execute controlled exploitation of identified vulnerabilities to validate security weaknesses during authorized penetration testing.
Instructions
Attempt exploitation using detected vulnerabilities
Input Schema
Name | Required | Description | Default |
---|---|---|---|
payload | No | Payload type | |
target | Yes | Target IP/URL | |
vulnerability | Yes | Vulnerability identifier |
Input Schema (JSON Schema)
{
"properties": {
"payload": {
"description": "Payload type",
"type": "string"
},
"target": {
"description": "Target IP/URL",
"type": "string"
},
"vulnerability": {
"description": "Vulnerability identifier",
"type": "string"
}
},
"required": [
"target",
"vulnerability"
],
"type": "object"
}