attack_simulate
Simulate active HTTP security attacks on Laravel applications to identify vulnerabilities like SQL injection, XSS, and CSRF flaws. Use on local or staging environments only.
Instructions
Run active HTTP security probes against a running Laravel application. Probes: error/debug disclosure, SQL injection on /login, reflected XSS, CSRF enforcement, auth bypass on /api/user, and brute-force rate limiting. WARNING: only use against local or staging environments — never production.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| path | Yes | Absolute path of the target Laravel project | |
| baseUrl | Yes | Base URL of the running Laravel application (e.g. http://localhost:8000) |