system_context dict | codebase_snapshot dict | task_type stringclasses 2
values | red_team dict | blue_team dict | coding dict | reasoning_trace stringlengths 26 152 | outcome dict |
|---|---|---|---|---|---|---|---|
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-4a5a97",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_11c8"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.99
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-af76cb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_b69e"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_9a13ca | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.91
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-118076",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_35fb"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.54
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-f0cd1f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_978f"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.42
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-36e004",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_92b1"
],
"steps": [
"target_system.exploit_d8222a",
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.exploit_28b139 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_fd0516 | {
"severity": "High",
"success": true,
"time_to_detect": 0.37
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-c610a4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_e3a4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.47
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-f3884d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_e1d5"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.52
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-e2621c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_5703"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.exploit_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.23
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-ead865",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_cd47"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.23
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-746427",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_4ff2"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.61
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-7dd82f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Broken Auth",
"impact": "Data Exfiltration",
"payloads": [
"payload_759e"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.exploit_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 1.23
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-738581",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_99a6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_fd0516 | {
"severity": "High",
"success": true,
"time_to_detect": 3.99
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-846206",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Buffer Overflow",
"impact": "Data Exfiltration",
"payloads": [
"payload_524c"
],
"steps": [
"target_system.exploit_9a13ca",
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_031983 -> target_system.exploit_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.92
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-6e41b4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_f47a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_031983",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_031983 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.97
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-a260c8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_fbda"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.83
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-b75551",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_5868"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.78
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-641394",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_6ee6"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.69
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-249d4d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_345f"
],
"steps": [
"target_system.exploit_031983",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.exploit_031983 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.66
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-4f3814",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_b689"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_28b139 -> target_system.exploit_9a13ca -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.37
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-e0cffc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_e829"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_9a13ca | {
"severity": "High",
"success": true,
"time_to_detect": 1
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-c79b93",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_0645"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.36
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-96958d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_c1a4"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.9
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-96b6e4",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_7abc"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_031983",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.9
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-d49f3f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_51e5"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.77
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-e8ee98",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_0d13"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_9a13ca",
"target_system.patch_d8222a",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.74
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-4548cc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_d876"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.09
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-a03adc",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_6856"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_031983",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.09
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-cb2892",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_0d65"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.66
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-555826",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_f180"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.02
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-7b07a6",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_b27c"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_28b139",
"target_system.patch_d8222a",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.62
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-86456d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_f325"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_031983",
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.73
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-c56631",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_a38b"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.scan_99914b",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_e28172 -> target_system.patch_031983 -> target_system.scan_99914b -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.65
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-29be41",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_d383"
],
"steps": [
"target_system.exploit_28b139",
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_28b139 -> target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.52
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-38bc16",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_d336"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.56
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-480ff5",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_f78c"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.82
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-950c45",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_3c7b"
],
"steps": [
"target_system.exploit_9a13ca"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_28b139",
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.48
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-96d111",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_7e2d"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.exploit_420cc4 -> target_system.patch_fd0516 | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.3
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-0c85e1",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_f184"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_fd0516 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.97
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-416eac",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "XSS",
"impact": "Data Exfiltration",
"payloads": [
"payload_16d6"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.93
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-49f8e3",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_2c67"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.27
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-8d5486",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_61f1"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_d8222a",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_031983 | {
"severity": "High",
"success": true,
"time_to_detect": 4.09
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-74404d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_24ae"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.34
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-6c9d7c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_01be"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.99
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-bca9ae",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_6484"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 3.34
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-6c1fbb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_b2d3"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_d8222a",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.91
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-96363a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_f858"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.07
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-9be8c8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_335b"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.11
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-6f061b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_02ff"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.17
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-b9d06f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Path Traversal",
"impact": "Data Exfiltration",
"payloads": [
"payload_7a06"
],
"steps": [
"target_system.exploit_d8222a",
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.exploit_d8222a -> target_system.exploit_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.4
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-643579",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_e9d9"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.63
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-9f1845",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_87ec"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_031983",
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.22
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-7b3efb",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_b46b"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.exploit_420cc4 -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.16
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-87b9f5",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Insecure Deserialization",
"impact": "Data Exfiltration",
"payloads": [
"payload_bb05"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.4
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-50ff37",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_41dc"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_28b139",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.01
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-64df06",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_3ec4"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 2.12
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-80e4c3",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "XSS",
"impact": "Data Exfiltration",
"payloads": [
"payload_89f2"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.exploit_420cc4 -> target_system.patch_d8222a -> target_system.exploit_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.04
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-d1e280",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_f7d3"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.38
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-412aec",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_b1ef"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_9a13ca",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_d8222a -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.86
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-715d5c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_f078"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_e28172 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 4.13
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-a5689a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_76d4"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.scan_99914b",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.scan_99914b -> target_system.exploit_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.08
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-502a3f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_aa84"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.exploit_420cc4 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.46
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-d61cb1",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_56b2"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.45
} |
{
"attack_vector": "Web Request",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-4a3604",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_8642"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.01
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-ff33c1",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_665d"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.scan_99914b",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.scan_99914b -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 1.33
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-8ed176",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_38bc"
],
"steps": [
"target_system.exploit_420cc4",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.exploit_e28172 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 1.25
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-a55846",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SQL Injection",
"impact": "Data Exfiltration",
"payloads": [
"payload_92b4"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_d8222a",
"target_system.patch_9a13ca",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_e28172 -> target_system.exploit_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.05
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-cc3941",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Insecure Deserialization",
"impact": "Data Exfiltration",
"payloads": [
"payload_eba3"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.exploit_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.19
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-35080f",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_13bf"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.85
} |
{
"attack_vector": "Internal Network",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-f1acad",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_1b3b"
],
"steps": [
"target_system.exploit_d8222a"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_fd0516",
"target_system.patch_420cc4",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.exploit_d8222a -> target_system.patch_420cc4 -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.22
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-562a75",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_31ae"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.exploit_420cc4 -> target_system.patch_031983 | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.86
} |
{
"attack_vector": "Phishing",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-f4222e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_d35b"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.95
} |
{
"attack_vector": "Internal Network",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-ca7ed7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_ac47"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-822a81",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_2ca5"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_e28172",
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_28b139 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.64
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-5e4406",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_05d4"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.exploit_e28172 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 0.32
} |
{
"attack_vector": "API Endpoint",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-b4ca8d",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_732e"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 2.63
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-74fae7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_1b0e"
],
"steps": [
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_420cc4",
"target_system.patch_e28172",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_9a13ca | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.1
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-5b2955",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_e008"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.04
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-b415c7",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_ecf7"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_d8222a",
"target_system.patch_28b139",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_e28172 | {
"severity": "Medium",
"success": true,
"time_to_detect": 3.69
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-06bc75",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_02fd"
],
"steps": [
"target_system.exploit_9a13ca",
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_9a13ca -> target_system.patch_28b139 -> target_system.exploit_e28172 -> target_system.patch_d8222a | {
"severity": "High",
"success": true,
"time_to_detect": 2.07
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-270c9b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_86fd"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_28b139 | {
"severity": "High",
"success": true,
"time_to_detect": 2.37
} |
{
"attack_vector": "Phishing",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-9f26fe",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_c52b"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_420cc4",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 4.78
} |
{
"attack_vector": "Web Request",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-df9b3c",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_6284"
],
"steps": [
"target_system.exploit_420cc4"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_28b139"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_420cc4 -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_28b139 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.54
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-4e5c57",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_0865"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.89
} |
{
"attack_vector": "Third-Party Library",
"severity": "Medium",
"vulnerability_type": "Path Traversal"
} | {
"snapshot_id": "SNAP-e3d79a",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Path Traversal",
"impact": "Blocked",
"payloads": [
"payload_90f0"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 -> target_system.patch_d8222a | {
"severity": "Medium",
"success": true,
"time_to_detect": 4.13
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-ea18ae",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "SQL Injection",
"impact": "Data Exfiltration",
"payloads": [
"payload_a38f"
],
"steps": [
"target_system.exploit_fd0516",
"target_system.exploit_fd0516",
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.exploit_fd0516 -> target_system.exploit_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.04
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-146e66",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_ebd3"
],
"steps": [
"target_system.exploit_e28172"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_fd0516",
"target_system.patch_9a13ca",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.exploit_e28172 -> target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 3.73
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-0c3782",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_1881"
],
"steps": [
"target_system.exploit_fd0516"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 2.74
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "SSRF"
} | {
"snapshot_id": "SNAP-887b97",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SSRF",
"impact": "Blocked",
"payloads": [
"payload_27c5"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "High",
"success": true,
"time_to_detect": 3.1
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-780a3b",
"vulnerable_component": "api_gateway/v1/auth.py"
} | exploit | {
"attack_vector": "Insecure Deserialization",
"impact": "Data Exfiltration",
"payloads": [
"payload_cbf2"
],
"steps": [
"target_system.exploit_031983",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_28b139",
"target_system.patch_420cc4",
"target_system.patch_d8222a"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.exploit_031983 -> target_system.exploit_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 0.4
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-eb5030",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_1834"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 1.29
} |
{
"attack_vector": "Third-Party Library",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-7629be",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_98bc"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.scan_99914b",
"target_system.patch_420cc4",
"target_system.patch_031983",
"target_system.patch_420cc4",
"target_system.patch_9a13ca"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_9a13ca | {
"severity": "High",
"success": true,
"time_to_detect": 4.17
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-354a7e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_2dec"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_420cc4",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_420cc4 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.59
} |
{
"attack_vector": "API Endpoint",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-0dbaa0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_8899"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 4.8
} |
{
"attack_vector": "Web Request",
"severity": "Medium",
"vulnerability_type": "XSS"
} | {
"snapshot_id": "SNAP-1f53d0",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "XSS",
"impact": "Blocked",
"payloads": [
"payload_fb33"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_420cc4 | {
"severity": "Medium",
"success": true,
"time_to_detect": 0.51
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Buffer Overflow"
} | {
"snapshot_id": "SNAP-17912e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Buffer Overflow",
"impact": "Blocked",
"payloads": [
"payload_68e6"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.43
} |
{
"attack_vector": "Phishing",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-f4cdc9",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_8a14"
],
"steps": [
"target_system.exploit_28b139"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_fd0516",
"target_system.patch_031983"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_28b139 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_031983 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.12
} |
{
"attack_vector": "Internal Network",
"severity": "High",
"vulnerability_type": "Broken Auth"
} | {
"snapshot_id": "SNAP-64dde1",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Broken Auth",
"impact": "Blocked",
"payloads": [
"payload_8d6a"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_d8222a",
"target_system.patch_28b139",
"target_system.patch_fd0516",
"target_system.patch_e28172"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_e28172 | {
"severity": "High",
"success": true,
"time_to_detect": 2.4
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-e20fb6",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_138b"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_9a13ca",
"target_system.patch_031983",
"target_system.patch_d8222a",
"target_system.patch_e28172",
"target_system.patch_420cc4"
],
"signals": [
"Abnormal SQL pattern",
... | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_420cc4 | {
"severity": "Critical",
"success": true,
"time_to_detect": 4.38
} |
{
"attack_vector": "API Endpoint",
"severity": "Critical",
"vulnerability_type": "SQL Injection"
} | {
"snapshot_id": "SNAP-e8ce7e",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "SQL Injection",
"impact": "Blocked",
"payloads": [
"payload_4a53"
],
"steps": []
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 3.93
} |
{
"attack_vector": "Third-Party Library",
"severity": "Critical",
"vulnerability_type": "Insecure Deserialization"
} | {
"snapshot_id": "SNAP-77eaa8",
"vulnerable_component": "api_gateway/v1/auth.py"
} | defend | {
"attack_vector": "Insecure Deserialization",
"impact": "Blocked",
"payloads": [
"payload_9f82"
],
"steps": [
"target_system.exploit_031983",
"target_system.exploit_031983"
]
} | {
"detection_method": "WAF Signature Match",
"mitigation": "Code Patching",
"response_steps": [
"target_system.patch_fd0516",
"target_system.patch_e28172",
"target_system.patch_fd0516"
],
"signals": [
"Abnormal SQL pattern",
"High latency"
]
} | {
"changes_made": "Parameterized query implementation",
"diff": "- query = \"...\" + input\n+ query = \"...\", (input,)",
"tests_added": [
"test_sql_injection_payload"
]
} | target_system.exploit_031983 -> target_system.patch_fd0516 -> target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_fd0516 | {
"severity": "Critical",
"success": true,
"time_to_detect": 1.73
} |
Solstice Nemesis Cyber Adversarial Traces
High-fidelity synthetic cybersecurity event traces for SOC and EDR model training. This public sample contains 500 synthetic security trace rows simulating adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes.
Built by Solstice AI Studio as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code.
What makes this different
Most public cybersecurity datasets are static snapshots of IP traffic. Nemesis focuses on the decision logic of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers.
What's in the box
- Decision Traces (
traces): 500 deep-dive traces of adversarial sequences that were blocked by simulated EDR logic.
Use Cases
- EDR Rule Benchmarking: Test the efficacy of detection rules against high-fidelity synthetic anomalies.
- Cybersecurity LLM Training: Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious.
- SOC Analyst Training: Populate training environments with realistic alert sequences.
Data Provenance
Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment.
Get the Full Pack
Scale this dataset to 2.5M+ or 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns. www.solsticestudio.ai/datasets
- Downloads last month
- 74