File size: 11,821 Bytes
6440b1f
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2a5a030
6440b1f
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
"""
VAPT Agent - Main module for API security testing.

This module orchestrates the vulnerability assessment and penetration testing
of APIs using Claude Agent SDK with Postman MCP server and custom VAPT tools.
"""

import asyncio
import os
import json
from dotenv import load_dotenv
from pathlib import Path
from typing import Dict, Optional, Callable, Tuple
from datetime import datetime

load_dotenv(override=True)

from claude_agent_sdk import ClaudeSDKClient, ClaudeAgentOptions
from vapt_tools import create_vapt_mcp_server
from config import VAPTConfig
from prompt import SYSTEM_PROMPT, get_vapt_query


async def run_vapt_agent_with_callback(
    api_endpoint: str,
    method: str = "GET",
    headers: Dict[str, str] = None,
    working_directory: str = None,
    progress_callback: Optional[Callable[[str], None]] = None,
) -> Tuple[str, Optional[str]]:
    """
    Execute VAPT agent with progress callbacks for UI integration.

    Args:
        api_endpoint: The API endpoint to test
        method: HTTP method for the endpoint
        headers: Optional headers for API requests
        working_directory: Working directory for the agent
        progress_callback: Optional callback function to receive progress updates

    Returns:
        Tuple of (report_content, report_file_path)
    """

    config = VAPTConfig()

    # Progress update helper
    def update_progress(message: str):
        if progress_callback:
            progress_callback(message)
        else:
            print(message)

    # Set up AWS Bedrock configuration if enabled
    if config.use_bedrock:
        update_progress("πŸ”§ Using AWS Bedrock for Claude")
        os.environ["CLAUDE_CODE_USE_BEDROCK"] = "1"
    else:
        update_progress("πŸ”§ Using Anthropic API for Claude")

    # Set up Postman MCP server configuration (SSE-based)
    update_progress("πŸ”Œ Connecting to Postman MCP server...")
    postman_api_key = config.postman_api_key
    if not postman_api_key:
        raise ValueError("POSTMAN_API_KEY not found in environment variables")

    postman_mcp_config = {
        "type": "sse",
        "url": "https://mcp.postman.com/mcp",
        "headers": {"Authorization": f"Bearer {postman_api_key}"},
    }

    # Create custom VAPT MCP server
    update_progress("πŸ› οΈ Initializing VAPT security tools...")
    vapt_tool_server = create_vapt_mcp_server()

    # Configure Claude Agent options
    model_name = config.model_name

    options = ClaudeAgentOptions(
        system_prompt=SYSTEM_PROMPT,
        mcp_servers={
            "postman": postman_mcp_config,
            "VAPTToolServer": vapt_tool_server,
        },
        allowed_tools=[
            "Read",
            "Write",
            "Bash",
            "Edit",
            "Glob",
            "Grep",
            "WebFetch",
            "WebSearch",
            "mcp__postman__*",  # All Postman MCP tools
            "mcp__VAPTToolServer__vapt_security_test",
        ],
        max_turns=100,
        model=model_name,
        #permission_mode="bypassPermissions",
        cwd=Path(working_directory) if working_directory else Path.cwd(),
    )

    report_content = ""
    report_file_path = None

    async with ClaudeSDKClient(options=options) as client:
        update_progress(f"βœ… Connected to Claude Agent SDK ")
        update_progress(f"🎯 Testing endpoint: {api_endpoint}")

        # Construct the query for the agent
        headers_str = json.dumps(headers, indent=2) if headers else "None"
        timestamp = datetime.now().strftime("%Y%m%d_%H%M%S")

        query = get_vapt_query(api_endpoint, method, headers_str, timestamp)

        # Execute the query
        timeout_sec = 600  # 10 minutes for security testing

        update_progress("πŸ” Starting security assessment...")

        try:
            await asyncio.wait_for(client.query(query), timeout=timeout_sec)
        except asyncio.TimeoutError:
            update_progress(f"⏱️ Query timed out after {timeout_sec}s")
            raise
        except Exception as e:
            update_progress(f"❌ Query failed: {str(e)}")
            raise

        # Stream and collect responses
        update_progress("πŸ“Š Collecting security test results...")

        response_texts = []
        async for message in client.receive_response():
            if hasattr(message, "content"):
                for block in message.content:
                    if hasattr(block, "text") and block.text:
                        response_texts.append(block.text)
                        # Stream progress for tool usage messages
                        if "SQL injection" in block.text.lower():
                            update_progress(
                                "πŸ›‘οΈ Testing SQL injection vulnerabilities..."
                            )
                        elif "xss" in block.text.lower():
                            update_progress("πŸ›‘οΈ Testing XSS vulnerabilities...")
                        elif (
                            "authentication" in block.text.lower()
                            or "authorization" in block.text.lower()
                        ):
                            update_progress(
                                "πŸ” Testing authentication/authorization..."
                            )
                        elif "rate limit" in block.text.lower():
                            update_progress("⚑ Testing rate limiting...")
                        elif "cors" in block.text.lower():
                            update_progress("🌐 Testing CORS policy...")
                        elif "headers" in block.text.lower():
                            update_progress("πŸ”’ Checking security headers...")

        report_content = "\n".join(response_texts)

        # Try to find the generated report file
        update_progress("πŸ“„ Locating generated report file...")
        reports_dir = Path.cwd() / "reports"
        if reports_dir.exists():
            # Find the most recent report file
            report_files = list(reports_dir.glob(f"vapt_report_{timestamp[:8]}*.md"))
            if report_files:
                report_file_path = str(
                    max(report_files, key=lambda p: p.stat().st_mtime)
                )
                update_progress(f"βœ… Report saved: {Path(report_file_path).name}")
                # Read the report content
                with open(report_file_path, "r", encoding="utf-8") as f:
                    report_content = f.read()

        if not report_file_path:
            # Check current directory
            report_files = list(Path.cwd().glob(f"vapt_report_{timestamp}*.md"))
            if report_files:
                report_file_path = str(report_files[0])
                update_progress(f"βœ… Report saved: {Path(report_file_path).name}")
                with open(report_file_path, "r", encoding="utf-8") as f:
                    report_content = f.read()

        update_progress("πŸŽ‰ Security assessment completed!")

    return report_content, report_file_path


async def run_vapt_agent(
    api_endpoint: str,
    method: str = "GET",
    headers: Dict[str, str] = None,
    working_directory: str = None,
) -> None:
    """
    Execute VAPT agent with Postman MCP server and custom security testing tools.

    Args:
        api_endpoint: The API endpoint to test
        method: HTTP method for the endpoint
        headers: Optional headers for API requests
        working_directory: Working directory for the agent
    """

    config = VAPTConfig()

    # Set up AWS Bedrock configuration if enabled
    if config.use_bedrock:
        print("[VAPT Agent] Using AWS Bedrock for Claude")
        os.environ["CLAUDE_CODE_USE_BEDROCK"] = "1"

    # Set up Postman MCP server configuration (SSE-based)
    postman_api_key = config.postman_api_key
    if not postman_api_key:
        raise ValueError("POSTMAN_API_KEY not found in environment variables")

    postman_mcp_config = {
        "type": "sse",
        "url": "https://mcp.postman.com/mcp",
        "headers": {"Authorization": f"Bearer {postman_api_key}"},
    }

    # Create custom VAPT MCP server
    vapt_tool_server = create_vapt_mcp_server()

    # Configure Claude Agent options
    model_name = config.model_name

    options = ClaudeAgentOptions(
        system_prompt=SYSTEM_PROMPT,
        mcp_servers={
            "postman": postman_mcp_config,
            "VAPTToolServer": vapt_tool_server,
        },
        allowed_tools=[
            "Read",
            "Write",
            "Bash",
            "Edit",
            "Glob",
            "Grep",
            "WebFetch",
            "WebSearch",
            "mcp__postman__*",  # All Postman MCP tools
            "mcp__VAPTToolServer__vapt_security_test",
        ],
        max_turns=100,
        model=model_name,
        permission_mode="bypassPermissions",
        cwd=Path(working_directory) if working_directory else Path.cwd(),
    )

    async with ClaudeSDKClient(options=options) as client:
        print(f"[VAPT Agent] Connected to Claude Agent SDK")
        if config.use_bedrock:
            print(f"[VAPT Agent] Using AWS Bedrock with model: {model_name}")
            print(f"[VAPT Agent] AWS Region: {config.aws_region}")
        else:
            print(f"[VAPT Agent] Using Anthropic API with model: {model_name}")
        print(f"[VAPT Agent] Testing endpoint: {api_endpoint}")

        # Construct the query for the agent
        headers_str = json.dumps(headers, indent=2) if headers else "None"
        timestamp = datetime.now().strftime("%Y%m%d_%H%M%S")

        query = get_vapt_query(api_endpoint, method, headers_str, timestamp)

        # Execute the query
        timeout_sec = 600  # 10 minutes for security testing

        try:
            await asyncio.wait_for(client.query(query), timeout=timeout_sec)
        except asyncio.TimeoutError:
            print(f"[VAPT Agent] Query timed out after {timeout_sec}s")
            raise
        except Exception as e:
            print(f"[VAPT Agent] Query failed: {str(e)}")
            raise

        # Stream and print responses
        print("\n[VAPT Agent] Security Testing Results:\n")
        print("=" * 80)

        async for message in client.receive_response():
            if hasattr(message, "content"):
                for block in message.content:
                    if hasattr(block, "text") and block.text:
                        print(block.text)

        print("\n" + "=" * 80)
        print("[VAPT Agent] Security assessment completed")


def main():
    """Main entry point for VAPT agent."""

    config = VAPTConfig()

    # Get test configuration
    api_endpoint = config.test_api_endpoint
    method = config.test_api_method

    headers = {"Content-Type": "application/json", "User-Agent": "VAPT-Agent/1.0"}

    # Add authentication header if provided
    if config.test_api_key:
        headers["Authorization"] = f"Bearer {config.test_api_key}"

    print("=" * 80)
    print("VAPT Agent - API Security Testing")
    print("=" * 80)
    if config.use_bedrock:
        print(f"Provider: AWS Bedrock")
        print(f"Region: {config.aws_region}")
        print(f"Model: {config.model_name}")
    else:
        print(f"Provider: Anthropic API")
        print(f"Model: {config.model_name}")
    print(f"Endpoint: {api_endpoint}")
    print(f"Method: {method}")
    print("=" * 80)
    print()

    try:
        asyncio.run(
            run_vapt_agent(
                api_endpoint=api_endpoint,
                method=method,
                headers=headers,
            )
        )
    except KeyboardInterrupt:
        print("\n[VAPT Agent] Interrupted by user")
    except Exception as e:
        print(f"\n[VAPT Agent] Error: {e}")
        raise


if __name__ == "__main__":
    main()