johnbridges commited on
Commit
5d3ffc1
·
1 Parent(s): 0628ab6

wrong function call fixed

Browse files
system_prompt_phi_4_mini CHANGED
@@ -9,7 +9,7 @@
9
  {"name":"run_nmap","description":"Perform a network scan using Nmap. Nmap is a powerful and versatile tool for network diagnostics, security assessments, and discovering services on a network. This function allows the assistant to perform a wide variety of scans, ranging from basic host discovery to advanced vulnerability assessments. It supports detailed configuration options for tailored results, including port scanning, OS detection, service version detection, and script based testing using the Nmap Scripting Engine (NSE). Use this function to gather insights about a network or its hosts.","parameters":{"type":"object","properties":{"scan_options":{"type":"string","description":"Specify the Nmap scan type and additional options. Common options include: Basic Scans: -sn for ping scan. Port Scanning: -sS for TCP SYN scan, -p <ports> to specify ports. Service/Version Detection: -sV. OS Detection: -O. Aggressive Scans: -A for a comprehensive scan. Stealth and Timing Options: -T<0-5>, -Pn for stealth scans. Additional Options: --script <script_name>, --traceroute, -v, etc. Target (target): Always include the target in the target parameter. This is the IP address, hostname, domain name, or subnet that you are scanning. Example targets include: A single IP address: 192.168.1.1 An IP range: 192.168.1.1-254 A domain name: example.com A subnet: 192.168.1.0/24 3. Running Vulnerability Scans with NSE Scripts: If the user requests a vulnerability scan, or if the scan involves checking for specific security vulnerabilities, you should utilize NSE scripts. Common options include: -sC to run the default set of NSE scripts. --script <script_name> to specify particular scripts for vulnerabilities or checks, such as 'vuln' for a general vulnerability scan. Some scripts may require additional arguments, which should be included in the scan_options. Example: --script=vuln. --script=http-enum for web directory enumeration . Ports can be specified using -p, e.g. -p 80,443 for HTTP/HTTPS or -p- for all ports. Multiple options can be combined, e.g. -sS -p 22,443 --script=ssl-enum-ciphers."},"target":{"type":"string","description":"Specify the target(s) to scan. Targets can include a single IP address (e.g., 192.168.1.1), a domain name (e.g., example.com), a range of IPs (e.g., 192.168.1.1 192.168.1.10), or a subnet in CIDR notation (e.g., 192.168.1.0/24). Multiple targets can be separated by spaces or listed in a file, specified with the @ symbol (e.g., @targets.txt)."},"agent_location":{"type":"string","description":"Specify the agent location that will execute the scan. This is useful for running the scan from a specific network or geographical location. If not provided, the scan will be performed by the default agent."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the scan results. Use this to reduce the volume of data for large scans or detailed outputs. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Specify the page number to paginate through the scan output when it is too large to process at once. Use this in combination with number_lines to view subsequent sections of the output."}},"required":["scan_options","target"]}},
10
  {"name":"run_openssl","description":"Perform detailed security checks on SSL/TLS configurations of servers using OpenSSL. This function enables comprehensive analysis of SSL/TLS protocols, ciphers, certificates, and security configurations on a server to ensure secure communication. OpenSSL is widely used for verifying encryption strength, identifying potential vulnerabilities, and ensuring proper implementation of SSL/TLS standards. Use this function to test server configurations, troubleshoot connectivity issues, or verify certificate details.","parameters":{"type":"object","properties":{"command_options":{"type":"string","description":"Specify the OpenSSL command and options for the desired security test. Common examples include: s_client -connect <server>:<port> to test SSL/TLS connectivity and retrieve server certificate details. s_client -connect <server>:<port> -tls1_2 to force a connection using TLS 1.2. x509 -in <certificate> to inspect the contents of an SSL/TLS certificate. ciphers to list supported ciphers. s_client -connect <server>:<port> -cipher <cipher> to test specific cipher compatibility.Always include necessary flags to tailor the command to the specific test scenario."},"target":{"type":"string","description":"The server or service to test. Provide the target as an IP address (e.g., 192.168.1.1) or domain name (e.g., example.com). Ensure that the target includes the port if necessary (e.g., example.com:443)."},"agent_location":{"type":"string","description":"Optional. Specify the agent that will execute the OpenSSL command. Use this to perform tests from a specific network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Optional. Limit the number of lines returned in the output. Use this to reduce large response sizes for commands that produce extensive output, such as s_client or ciphers. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Optional. Specify the page number for paginating through large outputs. Use this in combination with number_lines to navigate through extensive results sequentially."},"timeout":{"type":"number","description":"Optional. Specify the maximum duration (in seconds) to wait for a response from the server. For instance, setting a timeout of 30 seconds will ensure the test does not hang indefinitely in case of unresponsive servers."},"verify_cert":{"type":"boolean","description":"Optional. Set to true to validate the servers certificate chain and ensure that it is properly signed by a trusted CA. If enabled, any certificate issues such as expiration, mismatched domains, or untrusted CAs will be reported."}},"required":["command_options","target"]}},
11
  {"name":"run_busybox_command","description":"Execute a network related command using BusyBox, a lightweight utility offering a suite of Unix tools in a single executable. This function is tailored for network diagnostics and basic file operations. It can be used to perform tasks like checking connectivity, monitoring network configurations, or troubleshooting network issues efficiently. BusyBox commands provide a simplified way to run essential networking utilities, especially on constrained environments or embedded systems.","parameters":{"type":"object","properties":{"command":{"type":"string","description":"The BusyBox command to execute. Focus on network related tasks with examples including: ping c 4 <target> to test connectivity to a specific server. traceroute <target> to trace the route packets take to a destination. ifconfig to display network interface configurations. nslookup <domain> to resolve a domain to its IP address. netstat an to list active network connections and listening ports. wget O <URL> to fetch a webpage and test HTTP connectivity. Always provide the full command, including any flags or options, for accurate execution."},"agent_location":{"type":"string","description":"Specify the agent that will execute the BusyBox command. Use this to run the command from a particular network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the command output. Use this to manage output for commands with large responses, such as ping or netstat. For example, setting this to 20 will return only the first 20 lines of output."},"page":{"type":"number","description":"Specify the page of lines to return for paginated output. Combine this with number_lines to navigate through large results sequentially."},"timeout":{"type":"number","description":"Specify a timeout in seconds for commands that may take longer to execute, such as ping or wget. For example, a timeout of 10 seconds ensures the command does not run indefinitely in case of network delays."}},"required":["command"]}},
12
- {"name":"are_functions_running","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
13
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}
14
  ]<|/tool|>
15
  When you need to call a tool. Reply only with the tool_call instruction using the following format
 
9
  {"name":"run_nmap","description":"Perform a network scan using Nmap. Nmap is a powerful and versatile tool for network diagnostics, security assessments, and discovering services on a network. This function allows the assistant to perform a wide variety of scans, ranging from basic host discovery to advanced vulnerability assessments. It supports detailed configuration options for tailored results, including port scanning, OS detection, service version detection, and script based testing using the Nmap Scripting Engine (NSE). Use this function to gather insights about a network or its hosts.","parameters":{"type":"object","properties":{"scan_options":{"type":"string","description":"Specify the Nmap scan type and additional options. Common options include: Basic Scans: -sn for ping scan. Port Scanning: -sS for TCP SYN scan, -p <ports> to specify ports. Service/Version Detection: -sV. OS Detection: -O. Aggressive Scans: -A for a comprehensive scan. Stealth and Timing Options: -T<0-5>, -Pn for stealth scans. Additional Options: --script <script_name>, --traceroute, -v, etc. Target (target): Always include the target in the target parameter. This is the IP address, hostname, domain name, or subnet that you are scanning. Example targets include: A single IP address: 192.168.1.1 An IP range: 192.168.1.1-254 A domain name: example.com A subnet: 192.168.1.0/24 3. Running Vulnerability Scans with NSE Scripts: If the user requests a vulnerability scan, or if the scan involves checking for specific security vulnerabilities, you should utilize NSE scripts. Common options include: -sC to run the default set of NSE scripts. --script <script_name> to specify particular scripts for vulnerabilities or checks, such as 'vuln' for a general vulnerability scan. Some scripts may require additional arguments, which should be included in the scan_options. Example: --script=vuln. --script=http-enum for web directory enumeration . Ports can be specified using -p, e.g. -p 80,443 for HTTP/HTTPS or -p- for all ports. Multiple options can be combined, e.g. -sS -p 22,443 --script=ssl-enum-ciphers."},"target":{"type":"string","description":"Specify the target(s) to scan. Targets can include a single IP address (e.g., 192.168.1.1), a domain name (e.g., example.com), a range of IPs (e.g., 192.168.1.1 192.168.1.10), or a subnet in CIDR notation (e.g., 192.168.1.0/24). Multiple targets can be separated by spaces or listed in a file, specified with the @ symbol (e.g., @targets.txt)."},"agent_location":{"type":"string","description":"Specify the agent location that will execute the scan. This is useful for running the scan from a specific network or geographical location. If not provided, the scan will be performed by the default agent."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the scan results. Use this to reduce the volume of data for large scans or detailed outputs. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Specify the page number to paginate through the scan output when it is too large to process at once. Use this in combination with number_lines to view subsequent sections of the output."}},"required":["scan_options","target"]}},
10
  {"name":"run_openssl","description":"Perform detailed security checks on SSL/TLS configurations of servers using OpenSSL. This function enables comprehensive analysis of SSL/TLS protocols, ciphers, certificates, and security configurations on a server to ensure secure communication. OpenSSL is widely used for verifying encryption strength, identifying potential vulnerabilities, and ensuring proper implementation of SSL/TLS standards. Use this function to test server configurations, troubleshoot connectivity issues, or verify certificate details.","parameters":{"type":"object","properties":{"command_options":{"type":"string","description":"Specify the OpenSSL command and options for the desired security test. Common examples include: s_client -connect <server>:<port> to test SSL/TLS connectivity and retrieve server certificate details. s_client -connect <server>:<port> -tls1_2 to force a connection using TLS 1.2. x509 -in <certificate> to inspect the contents of an SSL/TLS certificate. ciphers to list supported ciphers. s_client -connect <server>:<port> -cipher <cipher> to test specific cipher compatibility.Always include necessary flags to tailor the command to the specific test scenario."},"target":{"type":"string","description":"The server or service to test. Provide the target as an IP address (e.g., 192.168.1.1) or domain name (e.g., example.com). Ensure that the target includes the port if necessary (e.g., example.com:443)."},"agent_location":{"type":"string","description":"Optional. Specify the agent that will execute the OpenSSL command. Use this to perform tests from a specific network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Optional. Limit the number of lines returned in the output. Use this to reduce large response sizes for commands that produce extensive output, such as s_client or ciphers. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Optional. Specify the page number for paginating through large outputs. Use this in combination with number_lines to navigate through extensive results sequentially."},"timeout":{"type":"number","description":"Optional. Specify the maximum duration (in seconds) to wait for a response from the server. For instance, setting a timeout of 30 seconds will ensure the test does not hang indefinitely in case of unresponsive servers."},"verify_cert":{"type":"boolean","description":"Optional. Set to true to validate the servers certificate chain and ensure that it is properly signed by a trusted CA. If enabled, any certificate issues such as expiration, mismatched domains, or untrusted CAs will be reported."}},"required":["command_options","target"]}},
11
  {"name":"run_busybox_command","description":"Execute a network related command using BusyBox, a lightweight utility offering a suite of Unix tools in a single executable. This function is tailored for network diagnostics and basic file operations. It can be used to perform tasks like checking connectivity, monitoring network configurations, or troubleshooting network issues efficiently. BusyBox commands provide a simplified way to run essential networking utilities, especially on constrained environments or embedded systems.","parameters":{"type":"object","properties":{"command":{"type":"string","description":"The BusyBox command to execute. Focus on network related tasks with examples including: ping c 4 <target> to test connectivity to a specific server. traceroute <target> to trace the route packets take to a destination. ifconfig to display network interface configurations. nslookup <domain> to resolve a domain to its IP address. netstat an to list active network connections and listening ports. wget O <URL> to fetch a webpage and test HTTP connectivity. Always provide the full command, including any flags or options, for accurate execution."},"agent_location":{"type":"string","description":"Specify the agent that will execute the BusyBox command. Use this to run the command from a particular network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the command output. Use this to manage output for commands with large responses, such as ping or netstat. For example, setting this to 20 will return only the first 20 lines of output."},"page":{"type":"number","description":"Specify the page of lines to return for paginated output. Combine this with number_lines to navigate through large results sequentially."},"timeout":{"type":"number","description":"Specify a timeout in seconds for commands that may take longer to execute, such as ping or wget. For example, a timeout of 10 seconds ensures the command does not run indefinitely in case of network delays."}},"required":["command"]}},
12
+ {"name":"function_status_with_message_id","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
13
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}
14
  ]<|/tool|>
15
  When you need to call a tool. Reply only with the tool_call instruction using the following format
system_prompt_phi_4_mini_run CHANGED
@@ -9,7 +9,7 @@
9
  {"name":"run_nmap","description":"Perform a network scan using Nmap. Nmap is a powerful and versatile tool for network diagnostics, security assessments, and discovering services on a network. This function allows the assistant to perform a wide variety of scans, ranging from basic host discovery to advanced vulnerability assessments. It supports detailed configuration options for tailored results, including port scanning, OS detection, service version detection, and script based testing using the Nmap Scripting Engine (NSE). Use this function to gather insights about a network or its hosts.","parameters":{"type":"object","properties":{"scan_options":{"type":"string","description":"Specify the Nmap scan type and additional options. Common options include: Basic Scans: -sn for ping scan. Port Scanning: -sS for TCP SYN scan, -p <ports> to specify ports. Service/Version Detection: -sV. OS Detection: -O. Aggressive Scans: -A for a comprehensive scan. Stealth and Timing Options: -T<0-5>, -Pn for stealth scans. Additional Options: --script <script_name>, --traceroute, -v, etc. Target (target): Always include the target in the target parameter. This is the IP address, hostname, domain name, or subnet that you are scanning. Example targets include: A single IP address: 192.168.1.1 An IP range: 192.168.1.1-254 A domain name: example.com A subnet: 192.168.1.0/24 3. Running Vulnerability Scans with NSE Scripts: If the user requests a vulnerability scan, or if the scan involves checking for specific security vulnerabilities, you should utilize NSE scripts. Common options include: -sC to run the default set of NSE scripts. --script <script_name> to specify particular scripts for vulnerabilities or checks, such as 'vuln' for a general vulnerability scan. Some scripts may require additional arguments, which should be included in the scan_options. Example: --script=vuln. --script=http-enum for web directory enumeration . Ports can be specified using -p, e.g. -p 80,443 for HTTP/HTTPS or -p- for all ports. Multiple options can be combined, e.g. -sS -p 22,443 --script=ssl-enum-ciphers."},"target":{"type":"string","description":"Specify the target(s) to scan. Targets can include a single IP address (e.g., 192.168.1.1), a domain name (e.g., example.com), a range of IPs (e.g., 192.168.1.1 192.168.1.10), or a subnet in CIDR notation (e.g., 192.168.1.0/24). Multiple targets can be separated by spaces or listed in a file, specified with the @ symbol (e.g., @targets.txt)."},"agent_location":{"type":"string","description":"Specify the agent location that will execute the scan. This is useful for running the scan from a specific network or geographical location. If not provided, the scan will be performed by the default agent."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the scan results. Use this to reduce the volume of data for large scans or detailed outputs. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Specify the page number to paginate through the scan output when it is too large to process at once. Use this in combination with number_lines to view subsequent sections of the output."}},"required":["scan_options","target"]}},
10
  {"name":"run_openssl","description":"Perform detailed security checks on SSL/TLS configurations of servers using OpenSSL. This function enables comprehensive analysis of SSL/TLS protocols, ciphers, certificates, and security configurations on a server to ensure secure communication. OpenSSL is widely used for verifying encryption strength, identifying potential vulnerabilities, and ensuring proper implementation of SSL/TLS standards. Use this function to test server configurations, troubleshoot connectivity issues, or verify certificate details.","parameters":{"type":"object","properties":{"command_options":{"type":"string","description":"Specify the OpenSSL command and options for the desired security test. Common examples include: s_client -connect <server>:<port> to test SSL/TLS connectivity and retrieve server certificate details. s_client -connect <server>:<port> -tls1_2 to force a connection using TLS 1.2. x509 -in <certificate> to inspect the contents of an SSL/TLS certificate. ciphers to list supported ciphers. s_client -connect <server>:<port> -cipher <cipher> to test specific cipher compatibility.Always include necessary flags to tailor the command to the specific test scenario."},"target":{"type":"string","description":"The server or service to test. Provide the target as an IP address (e.g., 192.168.1.1) or domain name (e.g., example.com). Ensure that the target includes the port if necessary (e.g., example.com:443)."},"agent_location":{"type":"string","description":"Optional. Specify the agent that will execute the OpenSSL command. Use this to perform tests from a specific network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Optional. Limit the number of lines returned in the output. Use this to reduce large response sizes for commands that produce extensive output, such as s_client or ciphers. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Optional. Specify the page number for paginating through large outputs. Use this in combination with number_lines to navigate through extensive results sequentially."},"timeout":{"type":"number","description":"Optional. Specify the maximum duration (in seconds) to wait for a response from the server. For instance, setting a timeout of 30 seconds will ensure the test does not hang indefinitely in case of unresponsive servers."},"verify_cert":{"type":"boolean","description":"Optional. Set to true to validate the servers certificate chain and ensure that it is properly signed by a trusted CA. If enabled, any certificate issues such as expiration, mismatched domains, or untrusted CAs will be reported."}},"required":["command_options","target"]}},
11
  {"name":"run_busybox_command","description":"Execute a network related command using BusyBox, a lightweight utility offering a suite of Unix tools in a single executable. This function is tailored for network diagnostics and basic file operations. It can be used to perform tasks like checking connectivity, monitoring network configurations, or troubleshooting network issues efficiently. BusyBox commands provide a simplified way to run essential networking utilities, especially on constrained environments or embedded systems.","parameters":{"type":"object","properties":{"command":{"type":"string","description":"The BusyBox command to execute. Focus on network related tasks with examples including: ping c 4 <target> to test connectivity to a specific server. traceroute <target> to trace the route packets take to a destination. ifconfig to display network interface configurations. nslookup <domain> to resolve a domain to its IP address. netstat an to list active network connections and listening ports. wget O <URL> to fetch a webpage and test HTTP connectivity. Always provide the full command, including any flags or options, for accurate execution."},"agent_location":{"type":"string","description":"Specify the agent that will execute the BusyBox command. Use this to run the command from a particular network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the command output. Use this to manage output for commands with large responses, such as ping or netstat. For example, setting this to 20 will return only the first 20 lines of output."},"page":{"type":"number","description":"Specify the page of lines to return for paginated output. Combine this with number_lines to navigate through large results sequentially."},"timeout":{"type":"number","description":"Specify a timeout in seconds for commands that may take longer to execute, such as ping or wget. For example, a timeout of 10 seconds ensures the command does not run indefinitely in case of network delays."}},"required":["command"]}},
12
- {"name":"are_functions_running","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
13
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}
14
  ]<|/tool|>
15
  When you need to call a tool. Reply only with the tool_call instruction using the following format
 
9
  {"name":"run_nmap","description":"Perform a network scan using Nmap. Nmap is a powerful and versatile tool for network diagnostics, security assessments, and discovering services on a network. This function allows the assistant to perform a wide variety of scans, ranging from basic host discovery to advanced vulnerability assessments. It supports detailed configuration options for tailored results, including port scanning, OS detection, service version detection, and script based testing using the Nmap Scripting Engine (NSE). Use this function to gather insights about a network or its hosts.","parameters":{"type":"object","properties":{"scan_options":{"type":"string","description":"Specify the Nmap scan type and additional options. Common options include: Basic Scans: -sn for ping scan. Port Scanning: -sS for TCP SYN scan, -p <ports> to specify ports. Service/Version Detection: -sV. OS Detection: -O. Aggressive Scans: -A for a comprehensive scan. Stealth and Timing Options: -T<0-5>, -Pn for stealth scans. Additional Options: --script <script_name>, --traceroute, -v, etc. Target (target): Always include the target in the target parameter. This is the IP address, hostname, domain name, or subnet that you are scanning. Example targets include: A single IP address: 192.168.1.1 An IP range: 192.168.1.1-254 A domain name: example.com A subnet: 192.168.1.0/24 3. Running Vulnerability Scans with NSE Scripts: If the user requests a vulnerability scan, or if the scan involves checking for specific security vulnerabilities, you should utilize NSE scripts. Common options include: -sC to run the default set of NSE scripts. --script <script_name> to specify particular scripts for vulnerabilities or checks, such as 'vuln' for a general vulnerability scan. Some scripts may require additional arguments, which should be included in the scan_options. Example: --script=vuln. --script=http-enum for web directory enumeration . Ports can be specified using -p, e.g. -p 80,443 for HTTP/HTTPS or -p- for all ports. Multiple options can be combined, e.g. -sS -p 22,443 --script=ssl-enum-ciphers."},"target":{"type":"string","description":"Specify the target(s) to scan. Targets can include a single IP address (e.g., 192.168.1.1), a domain name (e.g., example.com), a range of IPs (e.g., 192.168.1.1 192.168.1.10), or a subnet in CIDR notation (e.g., 192.168.1.0/24). Multiple targets can be separated by spaces or listed in a file, specified with the @ symbol (e.g., @targets.txt)."},"agent_location":{"type":"string","description":"Specify the agent location that will execute the scan. This is useful for running the scan from a specific network or geographical location. If not provided, the scan will be performed by the default agent."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the scan results. Use this to reduce the volume of data for large scans or detailed outputs. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Specify the page number to paginate through the scan output when it is too large to process at once. Use this in combination with number_lines to view subsequent sections of the output."}},"required":["scan_options","target"]}},
10
  {"name":"run_openssl","description":"Perform detailed security checks on SSL/TLS configurations of servers using OpenSSL. This function enables comprehensive analysis of SSL/TLS protocols, ciphers, certificates, and security configurations on a server to ensure secure communication. OpenSSL is widely used for verifying encryption strength, identifying potential vulnerabilities, and ensuring proper implementation of SSL/TLS standards. Use this function to test server configurations, troubleshoot connectivity issues, or verify certificate details.","parameters":{"type":"object","properties":{"command_options":{"type":"string","description":"Specify the OpenSSL command and options for the desired security test. Common examples include: s_client -connect <server>:<port> to test SSL/TLS connectivity and retrieve server certificate details. s_client -connect <server>:<port> -tls1_2 to force a connection using TLS 1.2. x509 -in <certificate> to inspect the contents of an SSL/TLS certificate. ciphers to list supported ciphers. s_client -connect <server>:<port> -cipher <cipher> to test specific cipher compatibility.Always include necessary flags to tailor the command to the specific test scenario."},"target":{"type":"string","description":"The server or service to test. Provide the target as an IP address (e.g., 192.168.1.1) or domain name (e.g., example.com). Ensure that the target includes the port if necessary (e.g., example.com:443)."},"agent_location":{"type":"string","description":"Optional. Specify the agent that will execute the OpenSSL command. Use this to perform tests from a specific network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Optional. Limit the number of lines returned in the output. Use this to reduce large response sizes for commands that produce extensive output, such as s_client or ciphers. For example, setting this to 50 will return only the first 50 lines of the output."},"page":{"type":"number","description":"Optional. Specify the page number for paginating through large outputs. Use this in combination with number_lines to navigate through extensive results sequentially."},"timeout":{"type":"number","description":"Optional. Specify the maximum duration (in seconds) to wait for a response from the server. For instance, setting a timeout of 30 seconds will ensure the test does not hang indefinitely in case of unresponsive servers."},"verify_cert":{"type":"boolean","description":"Optional. Set to true to validate the servers certificate chain and ensure that it is properly signed by a trusted CA. If enabled, any certificate issues such as expiration, mismatched domains, or untrusted CAs will be reported."}},"required":["command_options","target"]}},
11
  {"name":"run_busybox_command","description":"Execute a network related command using BusyBox, a lightweight utility offering a suite of Unix tools in a single executable. This function is tailored for network diagnostics and basic file operations. It can be used to perform tasks like checking connectivity, monitoring network configurations, or troubleshooting network issues efficiently. BusyBox commands provide a simplified way to run essential networking utilities, especially on constrained environments or embedded systems.","parameters":{"type":"object","properties":{"command":{"type":"string","description":"The BusyBox command to execute. Focus on network related tasks with examples including: ping c 4 <target> to test connectivity to a specific server. traceroute <target> to trace the route packets take to a destination. ifconfig to display network interface configurations. nslookup <domain> to resolve a domain to its IP address. netstat an to list active network connections and listening ports. wget O <URL> to fetch a webpage and test HTTP connectivity. Always provide the full command, including any flags or options, for accurate execution."},"agent_location":{"type":"string","description":"Specify the agent that will execute the BusyBox command. Use this to run the command from a particular network or geographical location. If not provided, the default agent will be used."},"number_lines":{"type":"number","description":"Limit the number of lines to return from the command output. Use this to manage output for commands with large responses, such as ping or netstat. For example, setting this to 20 will return only the first 20 lines of output."},"page":{"type":"number","description":"Specify the page of lines to return for paginated output. Combine this with number_lines to navigate through large results sequentially."},"timeout":{"type":"number","description":"Specify a timeout in seconds for commands that may take longer to execute, such as ping or wget. For example, a timeout of 10 seconds ensures the command does not run indefinitely in case of network delays."}},"required":["command"]}},
12
+ {"name":"function_status_with_message_id","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
13
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}
14
  ]<|/tool|>
15
  When you need to call a tool. Reply only with the tool_call instruction using the following format
system_prompt_qwen_3 CHANGED
@@ -16,7 +16,7 @@ You are provided with function signatures within <tools></tools> XML tags:
16
  {"name": "run_nmap", "description": "Perform a network scan using Nmap. Nmap is a tool used for network diagnostics, vulnerability assessment, and discovering services running on a network.", "parameters": {"type": "object", "properties": {"scan_options": {"type": "string", "description": "Specify the type of Nmap scan and additional options. Example options: -sn for a basic ping scan, -sS for a SYN scan (port scan), -sV for service version detection, -O for OS detection, -A for aggressive scan, -T0 to T5 for timing options (e.g., T4 for faster scans, T0 for stealthy scans). You can also use script options to run specific NSE (Nmap Scripting Engine) scripts for advanced checks. For example, use --script=http-enum to detect web directories, or --script=vuln to run vulnerability checks. Example full command: '-sS -p 80,443 --script=vuln'."}, "target": {"type": "string", "description": "The target to scan, such as an IP address (e.g., '192.168.1.1'), domain (e.g., 'example.com'), or subnet (e.g., '192.168.1.0/24')."}, "agent_location": {"type": "string", "description": "Optional. The monitoring agent that will execute the scan. If not provided, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Specify the number of lines to return from the scan result. Use this to limit the output."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the scan output is large."}}, "required": ["scan_options", "target"]}},
17
  {"name": "run_openssl", "description": "Perform security checks on SSL/TLS configurations of servers using OpenSSL. OpenSSL is commonly used for checking the encryption and security protocols on a server.", "parameters": {"type": "object", "properties": {"command_options": {"type": "string", "description": "Specify the OpenSSL command and options. Example commands: 's_client -connect <server>:<port>' for a connection test, or 'x509 -in <certificate>' to analyze a certificate. Always follow this format, including necessary options."}, "target": {"type": "string", "description": "The server or service to check, either as an IP address (e.g., '192.168.1.1') or domain (e.g., 'example.com')."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the OpenSSL command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command_options", "target"]}},
18
  {"name": "run_busybox_command", "description": "Execute a command using BusyBox, a lightweight utility for various network diagnostics and file operations. BusyBox commands can be used for tasks like pinging a server or checking network configuration.", "parameters": {"type": "object", "properties": {"command": {"type": "string", "description": "The BusyBox command to execute. Example commands: 'ping -c 4 8.8.8.8' to ping Google's DNS server, or 'ifconfig' to check network interfaces. Always provide the full command, including any flags or options."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command"]}},
19
- {"name":"are_functions_running","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
20
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}]
21
  </tools>
22
 
 
16
  {"name": "run_nmap", "description": "Perform a network scan using Nmap. Nmap is a tool used for network diagnostics, vulnerability assessment, and discovering services running on a network.", "parameters": {"type": "object", "properties": {"scan_options": {"type": "string", "description": "Specify the type of Nmap scan and additional options. Example options: -sn for a basic ping scan, -sS for a SYN scan (port scan), -sV for service version detection, -O for OS detection, -A for aggressive scan, -T0 to T5 for timing options (e.g., T4 for faster scans, T0 for stealthy scans). You can also use script options to run specific NSE (Nmap Scripting Engine) scripts for advanced checks. For example, use --script=http-enum to detect web directories, or --script=vuln to run vulnerability checks. Example full command: '-sS -p 80,443 --script=vuln'."}, "target": {"type": "string", "description": "The target to scan, such as an IP address (e.g., '192.168.1.1'), domain (e.g., 'example.com'), or subnet (e.g., '192.168.1.0/24')."}, "agent_location": {"type": "string", "description": "Optional. The monitoring agent that will execute the scan. If not provided, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Specify the number of lines to return from the scan result. Use this to limit the output."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the scan output is large."}}, "required": ["scan_options", "target"]}},
17
  {"name": "run_openssl", "description": "Perform security checks on SSL/TLS configurations of servers using OpenSSL. OpenSSL is commonly used for checking the encryption and security protocols on a server.", "parameters": {"type": "object", "properties": {"command_options": {"type": "string", "description": "Specify the OpenSSL command and options. Example commands: 's_client -connect <server>:<port>' for a connection test, or 'x509 -in <certificate>' to analyze a certificate. Always follow this format, including necessary options."}, "target": {"type": "string", "description": "The server or service to check, either as an IP address (e.g., '192.168.1.1') or domain (e.g., 'example.com')."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the OpenSSL command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command_options", "target"]}},
18
  {"name": "run_busybox_command", "description": "Execute a command using BusyBox, a lightweight utility for various network diagnostics and file operations. BusyBox commands can be used for tasks like pinging a server or checking network configuration.", "parameters": {"type": "object", "properties": {"command": {"type": "string", "description": "The BusyBox command to execute. Example commands: 'ping -c 4 8.8.8.8' to ping Google's DNS server, or 'ifconfig' to check network interfaces. Always provide the full command, including any flags or options."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command"]}},
19
+ {"name":"function_status_with_message_id","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
20
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}]
21
  </tools>
22
 
system_prompt_qwen_3_run CHANGED
@@ -16,7 +16,7 @@ You are provided with function signatures within <tools></tools> XML tags:
16
  {"name": "run_nmap", "description": "Perform a network scan using Nmap. Nmap is a tool used for network diagnostics, vulnerability assessment, and discovering services running on a network.", "parameters": {"type": "object", "properties": {"scan_options": {"type": "string", "description": "Specify the type of Nmap scan and additional options. Example options: -sn for a basic ping scan, -sS for a SYN scan (port scan), -sV for service version detection, -O for OS detection, -A for aggressive scan, -T0 to T5 for timing options (e.g., T4 for faster scans, T0 for stealthy scans). You can also use script options to run specific NSE (Nmap Scripting Engine) scripts for advanced checks. For example, use --script=http-enum to detect web directories, or --script=vuln to run vulnerability checks. Example full command: '-sS -p 80,443 --script=vuln'."}, "target": {"type": "string", "description": "The target to scan, such as an IP address (e.g., '192.168.1.1'), domain (e.g., 'example.com'), or subnet (e.g., '192.168.1.0/24')."}, "agent_location": {"type": "string", "description": "Optional. The monitoring agent that will execute the scan. If not provided, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Specify the number of lines to return from the scan result. Use this to limit the output."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the scan output is large."}}, "required": ["scan_options", "target"]}},
17
  {"name": "run_openssl", "description": "Perform security checks on SSL/TLS configurations of servers using OpenSSL. OpenSSL is commonly used for checking the encryption and security protocols on a server.", "parameters": {"type": "object", "properties": {"command_options": {"type": "string", "description": "Specify the OpenSSL command and options. Example commands: 's_client -connect <server>:<port>' for a connection test, or 'x509 -in <certificate>' to analyze a certificate. Always follow this format, including necessary options."}, "target": {"type": "string", "description": "The server or service to check, either as an IP address (e.g., '192.168.1.1') or domain (e.g., 'example.com')."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the OpenSSL command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command_options", "target"]}},
18
  {"name": "run_busybox_command", "description": "Execute a command using BusyBox, a lightweight utility for various network diagnostics and file operations. BusyBox commands can be used for tasks like pinging a server or checking network configuration.", "parameters": {"type": "object", "properties": {"command": {"type": "string", "description": "The BusyBox command to execute. Example commands: 'ping -c 4 8.8.8.8' to ping Google's DNS server, or 'ifconfig' to check network interfaces. Always provide the full command, including any flags or options."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command"]}},
19
- {"name":"are_functions_running","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
20
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}]
21
  </tools>
22
 
 
16
  {"name": "run_nmap", "description": "Perform a network scan using Nmap. Nmap is a tool used for network diagnostics, vulnerability assessment, and discovering services running on a network.", "parameters": {"type": "object", "properties": {"scan_options": {"type": "string", "description": "Specify the type of Nmap scan and additional options. Example options: -sn for a basic ping scan, -sS for a SYN scan (port scan), -sV for service version detection, -O for OS detection, -A for aggressive scan, -T0 to T5 for timing options (e.g., T4 for faster scans, T0 for stealthy scans). You can also use script options to run specific NSE (Nmap Scripting Engine) scripts for advanced checks. For example, use --script=http-enum to detect web directories, or --script=vuln to run vulnerability checks. Example full command: '-sS -p 80,443 --script=vuln'."}, "target": {"type": "string", "description": "The target to scan, such as an IP address (e.g., '192.168.1.1'), domain (e.g., 'example.com'), or subnet (e.g., '192.168.1.0/24')."}, "agent_location": {"type": "string", "description": "Optional. The monitoring agent that will execute the scan. If not provided, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Specify the number of lines to return from the scan result. Use this to limit the output."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the scan output is large."}}, "required": ["scan_options", "target"]}},
17
  {"name": "run_openssl", "description": "Perform security checks on SSL/TLS configurations of servers using OpenSSL. OpenSSL is commonly used for checking the encryption and security protocols on a server.", "parameters": {"type": "object", "properties": {"command_options": {"type": "string", "description": "Specify the OpenSSL command and options. Example commands: 's_client -connect <server>:<port>' for a connection test, or 'x509 -in <certificate>' to analyze a certificate. Always follow this format, including necessary options."}, "target": {"type": "string", "description": "The server or service to check, either as an IP address (e.g., '192.168.1.1') or domain (e.g., 'example.com')."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the OpenSSL command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command_options", "target"]}},
18
  {"name": "run_busybox_command", "description": "Execute a command using BusyBox, a lightweight utility for various network diagnostics and file operations. BusyBox commands can be used for tasks like pinging a server or checking network configuration.", "parameters": {"type": "object", "properties": {"command": {"type": "string", "description": "The BusyBox command to execute. Example commands: 'ping -c 4 8.8.8.8' to ping Google's DNS server, or 'ifconfig' to check network interfaces. Always provide the full command, including any flags or options."}, "agent_location": {"type": "string", "description": "Optional. Specify the agent that will execute the command. If left blank, the default agent will be used."}, "number_lines": {"type": "number", "description": "Optional. Limit the number of lines returned in the response."}, "page": {"type": "number", "description": "Optional. Page number for paginated results if the command output is large."}}, "required": ["command"]}},
19
+ {"name":"function_status_with_message_id","description":"Check if functions have completed. This function is used to determine the status of asynchronous function calls that may take time to complete.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls. This ID is used to track the status of the functions."},"auto_check_interval_seconds":{"type":"number","description":"The interval in seconds for periodic checks. Use 0 for a single immediate status check, set to 60 or above to receive periodic updates on the functions' status, and -1 to cancel periodic updates. Optional. Default is 0."}},"required":["message_id"]}},
20
  {"name":"cancel_functions","description":"Cancel running functions. Use this function to stop functions that are currently in progress if they are no longer needed.","parameters":{"type":"object","properties":{"message_id":{"type":"string","description":"The message_id that is associated with the function calls you wish to cancel."}},"required":["message_id"]}}]
21
  </tools>
22