{"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "CNAME", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "product"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Passively map external exposure for corp.example (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "org"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx", "filter_status": "403,404"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "CNAME"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx", "filter_status": "403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "TXT"]}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess and document web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX", "AAAA"]}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "A"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "org"]}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "org"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "TXT", "MX"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Quickly enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "MX", "AAAA", "CNAME"]}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT", "CNAME", "AAAA"]}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["product", "port"]}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20, "extensions": "php,html,asp,aspx"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "CNAME", "AAAA", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "AAAA", "TXT"]}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx", "filter_status": "403,404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "TXT", "MX", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "asn"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on example.com (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "TXT"]}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Passively map external exposure for 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "CNAME", "AAAA"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A"]}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 5, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "MX", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A", "TXT", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "product"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "AAAA", "A", "TXT"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Passively map external exposure for corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of http://portal.corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "A"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "product"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passively map external exposure for https://app.example.com (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Passively map external exposure for https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "A"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Passively map external exposure for example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "CNAME", "AAAA", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Safely enumerate externally exposed services on example.com (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Quickly enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "A", "MX", "AAAA"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "product"]}}, {"step": 4, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "AAAA", "A"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml", "filter_status": "404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA", "TXT"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx", "filter_status": "404"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "TXT"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "product"]}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA", "A"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "CNAME", "MX", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "AAAA"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "AAAA"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX", "CNAME"]}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "port"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on example.com (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Passively map external exposure for example.com (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "MX"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20 (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "MX", "TXT", "CNAME"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "AAAA"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "MX", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "AAAA", "A", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "TXT", "AAAA"]}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for 10.10.10.5 (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA", "A", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A", "MX"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT", "A", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "org"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX", "A"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Quickly enumerate public web routes for 172.16.0.0/28 without exploitation (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port", "org"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Passively map external exposure for 172.16.5.20 (respect rate limits)", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT", "MX", "CNAME"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "A", "MX"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A", "AAAA", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passively map external exposure for https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}, {"step": 5, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "AAAA", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20, "filter_status": "400,401,403,404"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "product"]}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "A", "MX", "AAAA"]}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "MX"]}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "AAAA", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "A", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "org"]}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "CNAME", "A", "AAAA"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX"]}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Quickly enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "MX", "AAAA"]}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Quickly enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "CNAME", "MX"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Quickly enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "A", "AAAA"]}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["org", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passively map external exposure for https://app.example.com (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "MX", "TXT"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "A", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "A", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml", "filter_status": "404"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "TXT", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT", "MX", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT", "A", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX", "A", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Quickly enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "TXT", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "asn"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "product"]}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "filter_status": "400,401,403,404"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for 10.10.10.5 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "TXT"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "asn"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "AAAA", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "TXT", "AAAA"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20, "extensions": "php,html,asp,aspx", "filter_status": "404"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx", "filter_status": "404"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT", "A"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "TXT", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A", "AAAA", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30, "extensions": "json,txt,xml"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "A", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml", "filter_status": "403,404"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX", "TXT", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["product"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT", "AAAA"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.5 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["port"]}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20, "extensions": "json,txt,xml"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A", "CNAME", "MX"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "TXT"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passively map external exposure for corp.example (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "TXT", "CNAME", "A"]}}, {"step": 5, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT", "CNAME", "A"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30}}, {"step": 3, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "CNAME", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT", "AAAA", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "A"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 50}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "filter_status": "404"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for corp.example without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "filter_status": "404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passively map external exposure for corp.example (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Quickly enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "asn"]}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "org"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "CNAME", "TXT", "AAAA"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "CNAME"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}]} {"objective": "Assess and document web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.5 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "AAAA", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passively map external exposure for example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A"]}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "CNAME", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "TXT", "MX"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "TXT", "CNAME", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "product"]}}]} {"objective": "Quickly enumerate public footprint of example.com using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "TXT", "MX"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT", "MX"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Quickly enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "product"]}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "AAAA"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30, "extensions": "json,txt,xml", "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Quickly enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A", "MX", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "filter_status": "404"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Quickly enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX", "CNAME", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "AAAA"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "MX", "AAAA", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Quickly enumerate public web routes for 172.16.0.0/28 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passively map external exposure for example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "A", "CNAME", "TXT"]}}, {"step": 4, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX", "CNAME", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passively map external exposure for https://app.example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "filter_status": "404"}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "MX"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 30, "extensions": "php,html,asp,aspx"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "MX"]}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20, "extensions": "json,txt,xml", "filter_status": "404"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx", "filter_status": "404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "MX", "TXT"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA", "CNAME", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT", "CNAME"]}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "filter_status": "404"}}, {"step": 5, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX", "CNAME", "A"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA", "CNAME", "A"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Quickly enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "org"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx", "filter_status": "400,401,403,404"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Passively map external exposure for corp.example (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for example.com without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "404"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "product"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "CNAME", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "MX", "A", "CNAME"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Quickly enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "asn"]}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passively map external exposure for corp.example (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5 (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of 172.16.0.0/28 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.0/24 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "CNAME", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "MX", "TXT"]}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "TXT", "A", "CNAME"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "A", "AAAA"]}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT", "MX", "AAAA"]}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "AAAA"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Quickly enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Quickly enumerate public footprint of corp.example using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "port"]}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "MX"]}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "CNAME", "AAAA"]}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.5 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "MX", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Quickly enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "filter_status": "404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A", "MX", "TXT"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "filter_status": "403,404"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "A", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Quickly enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "org"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 50}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "AAAA", "A"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Quickly enumerate public footprint of https://app.example.com using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["org", "asn"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "AAAA", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Quickly enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "AAAA", "MX"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "A", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "AAAA", "TXT"]}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5 (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "asn"]}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "CNAME"]}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A", "MX", "CNAME"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "AAAA", "TXT"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX", "AAAA", "CNAME"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX", "AAAA", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20, "filter_status": "404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "404"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "org"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passively map external exposure for https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "org"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port", "product"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "port"]}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "A", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 30, "filter_status": "400,401,403,404"}}, {"step": 3, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "TXT"]}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for corp.example without exploitation (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "MX", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "product"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A", "TXT"]}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT", "MX"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "AAAA", "CNAME", "MX"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "AAAA", "MX"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Assess and document web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "MX", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "port"]}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of 172.16.5.20 using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "CNAME", "AAAA", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "org"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "A"]}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "product"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passively map external exposure for https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT"]}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT", "AAAA", "MX"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT"]}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "org"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "AAAA"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "AAAA", "CNAME"]}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT"]}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX", "TXT", "CNAME"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "CNAME", "MX", "TXT"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "AAAA", "MX", "A"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["org", "product"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 50}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX", "CNAME"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20, "filter_status": "404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 30, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "org"]}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "TXT", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "CNAME"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "org"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "404"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "MX", "TXT"]}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A"]}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "CNAME", "TXT"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "TXT", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "org"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "A"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "A"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "CNAME"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "CNAME", "A"]}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA", "A", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for 10.10.10.5 (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "asn"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 50, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5 (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT", "A", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT", "A"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "CNAME", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A", "AAAA", "CNAME"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public web routes for corp.example without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "port"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "MX", "TXT", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20, "filter_status": "400,401,403,404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5 (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "product"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "A", "AAAA"]}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20, "filter_status": "400,401,403,404"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 50, "filter_status": "404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Safely enumerate externally exposed services on example.com (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "TXT"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20, "filter_status": "404"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "product"]}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "CNAME"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "asn"]}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Quickly enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "CNAME"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20 (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "port"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Passively map external exposure for http://portal.corp.example (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A", "TXT", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "asn"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 50, "filter_status": "403,404"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA"]}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Quickly enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["product", "org"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}]} {"objective": "Quickly enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A", "CNAME", "MX"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public web routes for example.com without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "asn"]}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "A", "CNAME", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX", "A"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "org"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "CNAME", "MX"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA", "TXT", "A"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "CNAME", "MX"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "MX", "CNAME"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "org"]}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml", "filter_status": "404"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "AAAA"]}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "A", "CNAME"]}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "asn"]}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30, "extensions": "php,html,asp,aspx"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "AAAA", "A"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX", "TXT"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}]} {"objective": "Passively map external exposure for 172.16.5.20 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "product"]}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["asn", "product"]}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for https://app.example.com without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 20}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml", "filter_status": "404"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "MX"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "AAAA"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "CNAME"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.5 within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "A"]}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "AAAA", "CNAME"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX", "CNAME", "AAAA"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "400,401,403,404"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20 (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "port"]}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "CNAME", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "404"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A", "AAAA", "MX"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "org"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "http://portal.corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml", "filter_status": "400,401,403,404"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "A", "MX"]}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT", "A", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "port"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Assess and document web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "A"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Assess and document web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "CNAME", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT", "MX"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "MX", "A"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "CNAME", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "org"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "A", "MX", "CNAME"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA"]}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "TXT", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "product"]}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public web routes for 172.16.5.20 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "MX", "AAAA"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "AAAA", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "filter_status": "403,404"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A", "CNAME"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "A", "AAAA", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "A", "AAAA", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Assess and document web-facing attack surface of https://app.example.com within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "403,404"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A", "MX"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Passively map external exposure for example.com (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "product"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT", "A"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "TXT"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A", "MX"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["org", "port"]}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml", "filter_status": "404"}}, {"step": 5, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA", "MX", "TXT"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "org"]}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "AAAA", "MX"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "CNAME"]}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "MX", "A"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "product"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "asn"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA", "TXT", "MX"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product", "port"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME"]}}]} {"objective": "Quickly enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "php,html,asp,aspx"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "port"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT", "MX", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Retry discovery against http://portal.corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "TXT", "AAAA", "A"]}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "filter_status": "400,401,403,404"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "A", "TXT", "MX"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["asn"]}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 20}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "MX", "AAAA", "TXT"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "asn"]}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX", "CNAME", "A"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 50}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passively map external exposure for 172.16.5.20 (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "org"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Quickly enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "POST", "threads": 20}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA", "CNAME", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 50, "extensions": "php,html,asp,aspx", "filter_status": "404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "CNAME", "A", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 50, "extensions": "json,txt,xml"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A", "TXT", "MX"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product", "port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20, "filter_status": "403,404"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "product"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "org"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "org"]}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "CNAME", "AAAA"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "A", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.0/24 and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "MX", "TXT", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "asn"]}}, {"step": 5, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "MX", "CNAME", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "CNAME", "MX", "A"]}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT", "MX", "CNAME"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "MX", "AAAA", "A"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA", "A"]}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "org"]}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "AAAA", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of example.com within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "CNAME", "TXT"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "asn"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passively map external exposure for http://portal.corp.example", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "product"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "MX"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "port"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "POST", "threads": 30}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 4, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "AAAA", "A"]}}, {"step": 5, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Quickly enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org", "product"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA", "CNAME", "MX"]}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "A"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "org"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "TXT"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Quickly enumerate public web routes for example.com without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20, "filter_status": "404"}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "TXT", "MX"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Handle request with insufficient authorization or scope (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "json"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "json,txt,xml"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "php,html,asp,aspx"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 30, "extensions": "php,html,asp,aspx"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "A", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "AAAA", "MX"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Retry discovery against example.com using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Perform limited, non-destructive service discovery against https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of example.com and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Quickly enumerate public footprint of example.com using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "GET", "threads": 50}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Map the web surface for example.com and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX", "CNAME", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Validate reachable hosts and open services for 172.16.0.0/28 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "TXT", "CNAME"]}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port", "product"]}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT", "CNAME"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about https://app.example.com and summarize potential entry points (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product", "port"]}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Passive recon on 10.10.10.0/24 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT"]}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn", "org"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Enumerate public footprint of http://portal.corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["CNAME", "AAAA", "MX", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Passively map external exposure for 10.10.10.5 (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["A", "MX", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 172.16.5.20 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "TXT", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30, "extensions": "json,txt,xml"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}]} {"objective": "Quickly enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "MX"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Handle request with insufficient authorization or scope (produce concise evidence)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Active enumeration of corp.example with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Map the web surface for 10.10.10.5 and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "A"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Safely enumerate externally exposed services on http://portal.corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}]} {"objective": "Enumerate public web routes for example.com without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "A", "AAAA", "MX"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}]} {"objective": "Determine missing authorization details before proceeding (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME", "A"]}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml", "filter_status": "404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "AAAA", "TXT"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "A", "MX", "CNAME"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passively map external exposure for https://app.example.com (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "TXT", "CNAME", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 30}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "org"]}}, {"step": 5, "tool": "whois", "args": {"target": "http://portal.corp.example"}}]} {"objective": "Conduct scoped active recon of 10.10.10.0/24 and summarize findings (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["product", "asn"]}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Identify reachable web endpoints for https://app.example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "port"]}}]} {"objective": "Passively map external exposure for example.com (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "TXT", "A", "MX"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against https://app.example.com and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "TXT", "MX", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "CNAME", "MX"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "AAAA", "A"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "MX", "A", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Gather OSINT about 10.10.10.5 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Map the web surface for http://portal.corp.example and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20, "extensions": "php,html,asp,aspx", "filter_status": "404"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on https://app.example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "MX", "A", "AAAA"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Active enumeration of 172.16.5.20 with conservative timing and minimal disruption (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["MX", "TXT"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 10.10.10.0/24 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 172.16.0.0/28 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Retry discovery against 10.10.10.5 using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["A", "TXT", "CNAME"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "MX", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product", "asn"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for 10.10.10.5 (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT", "AAAA"]}}, {"step": 2, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources (minimize noise)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Assess and document web-facing attack surface of corp.example within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Refuse unsafe or unauthorized request (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "A"]}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for corp.example", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "MX", "AAAA", "CNAME"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "product"]}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against https://app.example.com using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["CNAME", "TXT", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn", "port"]}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Assess web-facing attack surface of 10.10.10.0/24 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Assess web-facing attack surface of corp.example within defined scope (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "TXT", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org", "port"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for http://portal.corp.example (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org", "product"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.0.0/28 (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.5 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating http://portal.corp.example and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}]} {"objective": "Active enumeration of 172.16.0.0/28 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Web recon on 172.16.0.0/28 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (no exploitation)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "MX", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port", "asn"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["A", "MX", "AAAA", "CNAME"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "AAAA", "A"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["product"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 172.16.0.0/28 and summarize findings", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 64}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "txt"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME", "AAAA"]}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.5", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about corp.example and summarize potential entry points", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Assess web-facing attack surface of example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["AAAA", "CNAME", "A"]}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (no exploitation)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}]} {"objective": "Perform limited, non-destructive service discovery against corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["TXT", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 30}}, {"step": 3, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}]} {"objective": "Enumerate public web routes for http://portal.corp.example without exploitation", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Assess and document web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "MX"]}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["port", "product"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 172.16.5.20 and prioritize likely risks", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 3, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": true}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "asn"]}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product"]}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Map the web surface for https://app.example.com and collect evidence for triage (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["AAAA", "TXT"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "corp.example", "facets": ["port", "org"]}}]} {"objective": "Identify reachable web endpoints for corp.example and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on corp.example limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Web recon on example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "port"]}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "port"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Map the web surface for corp.example and collect evidence for triage (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "A", "CNAME"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "asn"]}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "AAAA"]}}]} {"objective": "Active enumeration of example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "org"]}}, {"step": 4, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Enumerate public web routes for 10.10.10.0/24 without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 64}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "exact"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "AAAA", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "shodan", "args": {"query": "corp.example", "facets": ["org"]}}, {"step": 5, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 6, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of https://app.example.com and summarize findings (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Refuse unsafe or unauthorized request (no exploitation)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Identify reachable web endpoints for 172.16.0.0/28 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Gather OSINT about http://portal.corp.example and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 2, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["port"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "port"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (respect rate limits)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["port", "asn"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "md"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.5 and prioritize likely risks (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Recover from failed enumeration against example.com and attempt safe fallback (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Validate reachable hosts and open services for http://portal.corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "exact"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 20}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of corp.example and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration (no exploitation)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "txt"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org", "port"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for https://app.example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["MX", "A", "CNAME", "TXT"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Perform limited, non-destructive service discovery against 10.10.10.0/24 (discovery only)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "org"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.0.0/28 (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}]} {"objective": "Assess web-facing attack surface of 172.16.5.20 within defined scope", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of 172.16.0.0/28 within defined scope", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Perform limited, non-destructive service discovery against example.com", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passively map external exposure for 172.16.5.20 (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Passive recon on 172.16.5.20 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Retry discovery against 172.16.5.20 using conservative recovery steps (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 4, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for https://app.example.com without exploitation (respect rate limits)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn", "port"]}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Active enumeration of http://portal.corp.example with conservative timing and minimal disruption (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "directory-list-2.3-small.txt", "method": "GET", "threads": 50, "extensions": "json,txt,xml", "filter_status": "403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["port"]}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Active enumeration of 10.10.10.0/24 with conservative timing and minimal disruption (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 32}}, {"step": 2, "tool": "report", "args": {"result": "cidr_scoping_decision", "format": "json"}}]} {"objective": "Safely enumerate externally exposed services on example.com (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Conduct scoped active recon of 10.10.10.5 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "active_recon", "format": "md"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Map the web surface for 172.16.5.20 and collect evidence for triage (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 172.16.5.20 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Passively map external exposure for corp.example (produce concise evidence)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "CNAME"]}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "ffuf", "args": {"url": "https://app.example.com/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50}}]} {"objective": "Identify likely internet-facing assets related to https://app.example.com without active scanning (discovery only)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 3, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Handle request with insufficient authorization or scope (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Passively map external exposure for 172.16.0.0/28", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "product"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Recover from failed enumeration against 172.16.5.20 and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "shodan", "args": {"query": "https://app.example.com", "facets": ["product"]}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Safely enumerate externally exposed services on corp.example", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation", "plan": [{"step": 1, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.5 using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Assess web-facing attack surface of 10.10.10.5 within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (discovery only)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "rules of engagement"]}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["TXT", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 3, "tool": "amass", "args": {"domain": "portal.corp.example", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 5, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["asn", "product"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (minimize noise)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["authorization", "scope", "target ownership"]}}]} {"objective": "Enumerate public footprint of 172.16.5.20 using non-intrusive sources (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["asn", "product"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.5.20", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}]} {"objective": "Gather OSINT about 172.16.5.20 and summarize potential entry points (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["product"]}}]} {"objective": "Retry discovery against 10.10.10.0/24 using conservative recovery steps (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Identify likely internet-facing assets related to example.com without active scanning", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["TXT", "AAAA", "CNAME", "MX"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "whois", "args": {"target": "example.com"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Retry discovery against 172.16.0.0/28 using conservative recovery steps", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (produce concise evidence)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Determine missing authorization details before proceeding", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Passively map external exposure for 10.10.10.5", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}]} {"objective": "Request clarification for an unscoped or unauthorized assessment (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for https://app.example.com (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["TXT", "MX", "CNAME", "A"]}}, {"step": 2, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["product"]}}, {"step": 4, "tool": "whois", "args": {"target": "https://app.example.com"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Identify reachable web endpoints for http://portal.corp.example and prioritize likely risks (respect rate limits)", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 20}}]} {"objective": "Conduct scoped active recon of 172.16.5.20 and summarize findings", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "subdomains"}}, {"step": 3, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Validate reachable hosts and open services for https://app.example.com within safe limits", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Active enumeration of 10.10.10.5 with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}]} {"objective": "Passively map external exposure for 172.16.5.20 (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Conduct scoped active recon of http://portal.corp.example and summarize findings", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 172.16.5.20", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org"]}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["org"]}}]} {"objective": "Quickly enumerate public footprint of 10.10.10.0/24 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "product"]}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Validate reachable hosts and open services for corp.example within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.0/24 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["product", "asn"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Identify reachable web endpoints for 10.10.10.0/24 and prioritize likely risks", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port", "product"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "top_n_hosts", "limit": 128}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Assess web-facing attack surface of http://portal.corp.example within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on corp.example with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["CNAME", "TXT"]}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn", "port"]}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Gather OSINT about 172.16.0.0/28 and summarize potential entry points", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["product", "org"]}}, {"step": 2, "tool": "whois", "args": {"target": "172.16.0.0/28"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning (discovery only)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["AAAA", "A", "CNAME", "MX"]}}, {"step": 2, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public footprint of 172.16.0.0/28 using non-intrusive sources", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn"]}}]} {"objective": "Enumerate public web routes for 172.16.5.20 without exploitation", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "asn"]}}, {"step": 3, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Perform limited, non-destructive service discovery against http://portal.corp.example", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["portal.corp.example"], "flags": "-Pn -sT -sV --reason"}}, {"step": 3, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "raft-small-words.txt", "method": "GET", "threads": 50, "filter_status": "403,404"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 10.10.10.5 with minimal noise and clear constraints (produce concise evidence)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["asn"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Assess and document web-facing attack surface of http://portal.corp.example within defined scope (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 2, "tool": "ffuf", "args": {"url": "http://portal.corp.example/FUZZ", "wordlist": "common.txt", "method": "POST", "threads": 20, "extensions": "php,html,asp,aspx", "filter_status": "403,404"}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "json"}}]} {"objective": "Enumerate public web routes for 10.10.10.5 without exploitation (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Request is outside defined scope or rules of engagement"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org", "port"]}}]} {"objective": "Passive recon on https://app.example.com with minimal noise and clear constraints (no exploitation)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["asn"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.0/24 within safe limits", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 128}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Passive recon on http://portal.corp.example with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "TXT", "A"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Recover from failed enumeration against 10.10.10.0/24 and attempt safe fallback", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Map the web surface for 172.16.0.0/28 and collect evidence for triage (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Recover from failed enumeration against 10.10.10.5 and attempt safe fallback", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org"]}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 3, "tool": "report", "args": {"result": "active_recon", "format": "json"}}]} {"objective": "Passively map external exposure for example.com", "plan": [{"step": 1, "tool": "wayback", "args": {"domain": "example.com", "scope": "exact"}}, {"step": 2, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}]} {"objective": "Perform limited, non-destructive service discovery against 172.16.5.20", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["172.16.5.20"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "172.16.5.20", "facets": ["org", "port"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["target(s)", "scope boundaries", "authorization"]}}]} {"objective": "Active enumeration of https://app.example.com with conservative timing and minimal disruption", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 2, "tool": "nmap", "args": {"targets": ["app.example.com"], "flags": "-Pn -sT -sV --reason"}}]} {"objective": "Assess web-facing attack surface of https://app.example.com within defined scope", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.5 (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --defeat-rst-ratelimit"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating 172.16.5.20 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["172.16.5.20"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "txt"}}]} {"objective": "Assess web-facing attack surface of 172.16.0.0/28 within defined scope (minimize noise)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 12, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["asn", "org"]}}, {"step": 3, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 4, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Authorization or ownership not established"}}]} {"objective": "Refuse unsafe or unauthorized request (respect rate limits)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 172.16.0.0/28 (produce concise evidence)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["org", "product"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV"}}]} {"objective": "Safely enumerate externally exposed services on example.com", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --reason"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Passively map external exposure for 10.10.10.0/24 (minimize noise)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Web recon on 10.10.10.0/24 limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["port"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}]} {"objective": "Enumerate public footprint of example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "AAAA"]}}, {"step": 2, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}, {"step": 3, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle request with insufficient authorization or scope", "plan": [{"step": 1, "tool": "whois", "args": {"target": "example.com"}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["CNAME", "TXT"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": true}}, {"step": 4, "tool": "report", "args": {"result": "insufficient_scope_safe_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "report", "args": {"result": "recovery_attempt", "format": "md"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": false, "status_code": true, "title": true}}]} {"objective": "Passive recon on 172.16.0.0/28 with minimal noise and clear constraints", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.0.0/28"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning (minimize noise)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Handle tool failure while enumerating https://app.example.com and continue with alternatives", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "wayback", "args": {"domain": "app.example.com", "scope": "exact"}}]} {"objective": "Gather OSINT about 10.10.10.0/24 and summarize potential entry points", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.0/24"}}, {"step": 2, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Gather OSINT about example.com and summarize potential entry points", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "TXT", "CNAME"]}}, {"step": 3, "tool": "wayback", "args": {"domain": "example.com", "scope": "subdomains"}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "shodan", "args": {"query": "example.com", "facets": ["port", "product"]}}, {"step": 6, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement (minimize noise)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Retry discovery against corp.example using conservative recovery steps (produce concise evidence)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Recover from failed enumeration against http://portal.corp.example and attempt safe fallback", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["http://portal.corp.example"], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 2, "tool": "wayback", "args": {"domain": "portal.corp.example", "scope": "subdomains"}}, {"step": 3, "tool": "conclude", "args": {"reason": "recovery attempt exhausted; defer to manual triage"}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 10.10.10.5 without active scanning (respect rate limits)", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["org"]}}, {"step": 2, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 3, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Handle tool failure while enumerating 10.10.10.5 and continue with alternatives", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "amass", "args": {"domain": "corp.example", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "corp.example", "facets": ["asn"]}}, {"step": 4, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Enumerate public web routes for 172.16.0.0/28 without exploitation", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "all_hosts", "limit": 16}}, {"step": 2, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["asn", "org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 10, "follow_redirects": false, "status_code": true, "title": false}}, {"step": 5, "tool": "report", "args": {"result": "network_surface", "format": "md"}}]} {"objective": "Refuse unsafe or unauthorized request (discovery only)", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Insufficient context to ensure safe and authorized assessment"}}]} {"objective": "Refuse unsafe or unauthorized request", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Handle request with insufficient authorization or scope (no exploitation)", "plan": [{"step": 1, "tool": "clarify", "args": {"missing": ["scope", "testing window", "allowed techniques"]}}]} {"objective": "Validate reachable hosts and open services for 10.10.10.5 within safe limits", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["10.10.10.5"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["10.10.10.5"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Handle tool failure while enumerating 172.16.0.0/28 and continue with alternatives (respect rate limits)", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "172.16.0.0/28", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 15, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Identify likely internet-facing assets related to 172.16.5.20 without active scanning (produce concise evidence)", "plan": [{"step": 1, "tool": "whois", "args": {"target": "172.16.5.20"}}, {"step": 2, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Decline activity that lacks authorization or violates rules of engagement", "plan": [{"step": 1, "tool": "refuse", "args": {"reason": "Potentially unsafe intent detected without validation"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (minimize noise)", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "CNAME"]}}, {"step": 2, "tool": "whois", "args": {"target": "example.com"}}, {"step": 3, "tool": "shodan", "args": {"query": "example.com", "facets": ["product"]}}]} {"objective": "Identify likely internet-facing assets related to 172.16.0.0/28 without active scanning", "plan": [{"step": 1, "tool": "shodan", "args": {"query": "172.16.0.0/28", "facets": ["port"]}}]} {"objective": "Enumerate public footprint of 10.10.10.5 using non-intrusive sources", "plan": [{"step": 1, "tool": "whois", "args": {"target": "10.10.10.5"}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.5", "facets": ["port", "org"]}}]} {"objective": "Web recon on https://app.example.com limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "app.example.com", "include_expired": true}}, {"step": 2, "tool": "httpx", "args": {"targets": ["https://app.example.com"], "timeout": 8, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 3, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Validate reachable hosts and open services for example.com within safe limits (minimize noise)", "plan": [{"step": 1, "tool": "nmap", "args": {"targets": ["example.com"], "flags": "-Pn -sT -sV --version-light"}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 10, "follow_redirects": true, "status_code": true, "title": true}}]} {"objective": "Identify reachable web endpoints for example.com and prioritize likely risks", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 2, "tool": "httpx", "args": {"targets": ["example.com"], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}, {"step": 3, "tool": "report", "args": {"result": "scoped_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of corp.example using non-intrusive sources (discovery only)", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": true}}, {"step": 2, "tool": "shodan", "args": {"query": "corp.example", "facets": ["product", "org"]}}, {"step": 3, "tool": "passive_dns", "args": {"domain": "corp.example", "record_types": ["MX", "A", "CNAME"]}}, {"step": 4, "tool": "whois", "args": {"target": "corp.example"}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "json"}}]} {"objective": "Recover from failed enumeration against corp.example and attempt safe fallback (discovery only)", "plan": [{"step": 1, "tool": "httpx", "args": {"targets": ["corp.example"], "timeout": 5, "follow_redirects": false, "status_code": true, "title": true}}, {"step": 2, "tool": "crtsh", "args": {"domain": "corp.example", "include_expired": false}}, {"step": 3, "tool": "report", "args": {"result": "recovery_attempt", "format": "json"}}]} {"objective": "Web recon on http://portal.corp.example limited to discovery and content enumeration", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": false}}, {"step": 2, "tool": "report", "args": {"result": "scoped_recon", "format": "txt"}}]} {"objective": "Passive recon on example.com with minimal noise and clear constraints (discovery only)", "plan": [{"step": 1, "tool": "amass", "args": {"domain": "example.com", "mode": "passive", "include_sources": false}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "example.com", "record_types": ["A", "AAAA"]}}, {"step": 3, "tool": "crtsh", "args": {"domain": "example.com", "include_expired": false}}, {"step": 4, "tool": "whois", "args": {"target": "example.com"}}, {"step": 5, "tool": "conclude", "args": {"reason": "sufficient surface identified"}}]} {"objective": "Safely enumerate externally exposed services on 10.10.10.0/24", "plan": [{"step": 1, "tool": "cidr_expand", "args": {"cidr": "10.10.10.0/24", "strategy": "sample_hosts", "limit": 32}}, {"step": 2, "tool": "shodan", "args": {"query": "10.10.10.0/24", "facets": ["org"]}}, {"step": 3, "tool": "nmap", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "flags": "-Pn -sT -sV --version-light"}}, {"step": 4, "tool": "httpx", "args": {"targets": [{"from": "cidr_expand", "field": "hosts"}], "timeout": 8, "follow_redirects": true, "status_code": true, "title": false}}]} {"objective": "Identify likely internet-facing assets related to http://portal.corp.example without active scanning", "plan": [{"step": 1, "tool": "crtsh", "args": {"domain": "portal.corp.example", "include_expired": true}}, {"step": 2, "tool": "passive_dns", "args": {"domain": "portal.corp.example", "record_types": ["MX", "CNAME", "AAAA", "TXT"]}}, {"step": 3, "tool": "whois", "args": {"target": "http://portal.corp.example"}}, {"step": 4, "tool": "shodan", "args": {"query": "portal.corp.example", "facets": ["org"]}}, {"step": 5, "tool": "report", "args": {"result": "passive_recon", "format": "md"}}]} {"objective": "Enumerate public footprint of https://app.example.com using non-intrusive sources", "plan": [{"step": 1, "tool": "passive_dns", "args": {"domain": "app.example.com", "record_types": ["AAAA", "MX", "A", "TXT"]}}, {"step": 2, "tool": "amass", "args": {"domain": "app.example.com", "mode": "passive", "include_sources": false}}, {"step": 3, "tool": "shodan", "args": {"query": "app.example.com", "facets": ["org"]}}, {"step": 4, "tool": "report", "args": {"result": "passive_recon", "format": "txt"}}]}