system_context
dict
codebase_snapshot
dict
task_type
stringclasses
2 values
red_team
dict
blue_team
dict
coding
dict
reasoning_trace
stringlengths
26
152
outcome
dict
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-4a5a97", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_11c8" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_d8222a", "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.99 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-af76cb", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_b69e" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_9a13ca
{ "severity": "Medium", "success": true, "time_to_detect": 2.91 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-118076", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_35fb" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.54 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-f0cd1f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_978f" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.42 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-36e004", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_92b1" ], "steps": [ "target_system.exploit_d8222a", "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.exploit_28b139 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "High", "success": true, "time_to_detect": 0.37 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-c610a4", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_e3a4" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 0.47 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-f3884d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_e1d5" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.52 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-e2621c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_5703" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.exploit_fd0516 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 2.23 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-ead865", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_cd47" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_031983", "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_e28172
{ "severity": "Medium", "success": true, "time_to_detect": 1.23 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-746427", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_4ff2" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 1.61 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-7dd82f", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Broken Auth", "impact": "Data Exfiltration", "payloads": [ "payload_759e" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.exploit_e28172
{ "severity": "High", "success": true, "time_to_detect": 1.23 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-738581", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_99a6" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_fd0516
{ "severity": "High", "success": true, "time_to_detect": 3.99 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-846206", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Buffer Overflow", "impact": "Data Exfiltration", "payloads": [ "payload_524c" ], "steps": [ "target_system.exploit_9a13ca", "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_e28172", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_031983 -> target_system.exploit_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 0.92 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-6e41b4", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_f47a" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_031983", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_031983 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.97 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-a260c8", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_fbda" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 3.83 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-b75551", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_5868" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_e28172", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_420cc4
{ "severity": "Critical", "success": true, "time_to_detect": 1.78 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-641394", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_6ee6" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_28b139 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 1.69 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-249d4d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_345f" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.exploit_031983 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 0.66 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-4f3814", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_b689" ], "steps": [ "target_system.exploit_fd0516", "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_28b139 -> target_system.exploit_9a13ca -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.37 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-e0cffc", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_e829" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_d8222a", "target_system.patch_e28172", "target_system.patch_e28172", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_e28172 -> target_system.patch_9a13ca
{ "severity": "High", "success": true, "time_to_detect": 1 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-c79b93", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_0645" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 2.36 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-96958d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_c1a4" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_420cc4 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.9 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-96b6e4", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_7abc" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 4.9 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-d49f3f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_51e5" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 1.77 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-e8ee98", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_0d13" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_9a13ca", "target_system.patch_d8222a", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_28b139
{ "severity": "Critical", "success": true, "time_to_detect": 1.74 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-4548cc", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_d876" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.09 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-a03adc", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_6856" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_031983", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.09 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-cb2892", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_0d65" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 0.66 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-555826", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_f180" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 4.02 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-7b07a6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_b27c" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_28b139", "target_system.patch_d8222a", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.patch_d8222a -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 4.62 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-86456d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_f325" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_031983", "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_031983 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.73 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-c56631", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_a38b" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.scan_99914b", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_e28172 -> target_system.patch_031983 -> target_system.scan_99914b -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 4.65 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-29be41", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_d383" ], "steps": [ "target_system.exploit_28b139", "target_system.exploit_d8222a", "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_28b139 -> target_system.patch_28b139 -> target_system.exploit_d8222a -> target_system.patch_fd0516 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 3.52 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-38bc16", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_d336" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 1.56 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-480ff5", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_f78c" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_420cc4 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 2.82 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-950c45", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_3c7b" ], "steps": [ "target_system.exploit_9a13ca" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_28b139", "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_e28172 -> target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 2.48 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-96d111", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_7e2d" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_e28172", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_e28172 -> target_system.exploit_420cc4 -> target_system.patch_fd0516
{ "severity": "Medium", "success": true, "time_to_detect": 4.3 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-0c85e1", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_f184" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_fd0516
{ "severity": "Medium", "success": true, "time_to_detect": 2.97 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-416eac", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "XSS", "impact": "Data Exfiltration", "payloads": [ "payload_16d6" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.93 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-49f8e3", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_2c67" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 0.27 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-8d5486", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_61f1" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a", "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_031983
{ "severity": "High", "success": true, "time_to_detect": 4.09 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-74404d", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_24ae" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_fd0516", "target_system.patch_9a13ca", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_28b139 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 0.34 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-6c9d7c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_01be" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 4.99 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-bca9ae", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_6484" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 3.34 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-6c1fbb", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_b2d3" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_d8222a", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 4.91 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-96363a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_f858" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.07 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-9be8c8", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_335b" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_420cc4", "target_system.patch_28b139", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_28b139 -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 0.11 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-6f061b", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_02ff" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_9a13ca", "target_system.patch_9a13ca", "target_system.patch_9a13ca", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 1.17 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-b9d06f", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Path Traversal", "impact": "Data Exfiltration", "payloads": [ "payload_7a06" ], "steps": [ "target_system.exploit_d8222a", "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_e28172", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.exploit_d8222a -> target_system.exploit_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 2.4 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-643579", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_e9d9" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.63 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-9f1845", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_87ec" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_031983", "target_system.patch_28b139", "target_system.patch_e28172", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_031983 -> target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 4.22 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-7b3efb", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_b46b" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_e28172", "target_system.patch_e28172", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.exploit_420cc4 -> target_system.patch_e28172 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 2.16 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-87b9f5", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_bb05" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.4 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-50ff37", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_41dc" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_28b139", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_28b139 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 4.01 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-64df06", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_3ec4" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 2.12 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-80e4c3", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "XSS", "impact": "Data Exfiltration", "payloads": [ "payload_89f2" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.exploit_420cc4 -> target_system.patch_d8222a -> target_system.exploit_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.04 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-d1e280", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_f7d3" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_28b139 -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 0.38 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-412aec", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_b1ef" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_9a13ca", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_d8222a -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_9a13ca -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 1.86 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-715d5c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_f078" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.exploit_e28172 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 4.13 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-a5689a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_76d4" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.scan_99914b", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.scan_99914b -> target_system.exploit_fd0516 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 1.08 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-502a3f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_aa84" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.exploit_420cc4 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 3.46 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-d61cb1", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_56b2" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 0.45 }
{ "attack_vector": "Web Request", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-4a3604", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_8642" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.01 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-ff33c1", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_665d" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.scan_99914b", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.scan_99914b -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 1.33 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-8ed176", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_38bc" ], "steps": [ "target_system.exploit_420cc4", "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.exploit_e28172 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 1.25 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-a55846", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SQL Injection", "impact": "Data Exfiltration", "payloads": [ "payload_92b4" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_d8222a", "target_system.patch_9a13ca", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_d8222a -> target_system.patch_9a13ca -> target_system.patch_e28172 -> target_system.exploit_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 1.05 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-cc3941", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_eba3" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_fd0516 -> target_system.patch_fd0516 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 1.19 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-35080f", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_13bf" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 0.85 }
{ "attack_vector": "Internal Network", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-f1acad", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_1b3b" ], "steps": [ "target_system.exploit_d8222a" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_fd0516", "target_system.patch_420cc4", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.exploit_d8222a -> target_system.patch_420cc4 -> target_system.patch_031983
{ "severity": "Medium", "success": true, "time_to_detect": 2.22 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-562a75", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_31ae" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983", "target_system.patch_fd0516", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_fd0516 -> target_system.exploit_420cc4 -> target_system.patch_031983
{ "severity": "Medium", "success": true, "time_to_detect": 4.86 }
{ "attack_vector": "Phishing", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-f4222e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_d35b" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 3.95 }
{ "attack_vector": "Internal Network", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-ca7ed7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_ac47" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-822a81", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_2ca5" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_e28172", "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_e28172 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_28b139
{ "severity": "Medium", "success": true, "time_to_detect": 1.64 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-5e4406", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_05d4" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.exploit_e28172 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 0.32 }
{ "attack_vector": "API Endpoint", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-b4ca8d", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_732e" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.exploit_420cc4 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 2.63 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-74fae7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_1b0e" ], "steps": [ "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_420cc4", "target_system.patch_e28172", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_9a13ca -> target_system.patch_420cc4 -> target_system.patch_e28172 -> target_system.patch_9a13ca
{ "severity": "Critical", "success": true, "time_to_detect": 1.1 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-5b2955", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_e008" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 4.04 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-b415c7", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_ecf7" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_e28172
{ "severity": "Medium", "success": true, "time_to_detect": 3.69 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-06bc75", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_02fd" ], "steps": [ "target_system.exploit_9a13ca", "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_9a13ca -> target_system.patch_28b139 -> target_system.exploit_e28172 -> target_system.patch_d8222a
{ "severity": "High", "success": true, "time_to_detect": 2.07 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-270c9b", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_86fd" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_28b139
{ "severity": "High", "success": true, "time_to_detect": 2.37 }
{ "attack_vector": "Phishing", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-9f26fe", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_c52b" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_420cc4", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_420cc4 -> target_system.patch_420cc4
{ "severity": "High", "success": true, "time_to_detect": 4.78 }
{ "attack_vector": "Web Request", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-df9b3c", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_6284" ], "steps": [ "target_system.exploit_420cc4" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_28b139" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_420cc4 -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_28b139
{ "severity": "Critical", "success": true, "time_to_detect": 1.54 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-4e5c57", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_0865" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 1.89 }
{ "attack_vector": "Third-Party Library", "severity": "Medium", "vulnerability_type": "Path Traversal" }
{ "snapshot_id": "SNAP-e3d79a", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Path Traversal", "impact": "Blocked", "payloads": [ "payload_90f0" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172 -> target_system.patch_d8222a
{ "severity": "Medium", "success": true, "time_to_detect": 4.13 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-ea18ae", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "SQL Injection", "impact": "Data Exfiltration", "payloads": [ "payload_a38f" ], "steps": [ "target_system.exploit_fd0516", "target_system.exploit_fd0516", "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_d8222a -> target_system.patch_031983 -> target_system.exploit_fd0516 -> target_system.exploit_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 1.04 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-146e66", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_ebd3" ], "steps": [ "target_system.exploit_e28172" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_fd0516", "target_system.patch_9a13ca", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.exploit_e28172 -> target_system.patch_fd0516 -> target_system.patch_9a13ca -> target_system.patch_420cc4
{ "severity": "High", "success": true, "time_to_detect": 3.73 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-0c3782", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_1881" ], "steps": [ "target_system.exploit_fd0516" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_fd0516 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 2.74 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "SSRF" }
{ "snapshot_id": "SNAP-887b97", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SSRF", "impact": "Blocked", "payloads": [ "payload_27c5" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_420cc4
{ "severity": "High", "success": true, "time_to_detect": 3.1 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-780a3b", "vulnerable_component": "api_gateway/v1/auth.py" }
exploit
{ "attack_vector": "Insecure Deserialization", "impact": "Data Exfiltration", "payloads": [ "payload_cbf2" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_28b139", "target_system.patch_420cc4", "target_system.patch_d8222a" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_28b139 -> target_system.patch_420cc4 -> target_system.patch_d8222a -> target_system.exploit_031983 -> target_system.exploit_031983
{ "severity": "Critical", "success": true, "time_to_detect": 0.4 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-eb5030", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_1834" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 1.29 }
{ "attack_vector": "Third-Party Library", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-7629be", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_98bc" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.scan_99914b", "target_system.patch_420cc4", "target_system.patch_031983", "target_system.patch_420cc4", "target_system.patch_9a13ca" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.scan_99914b -> target_system.patch_420cc4 -> target_system.patch_031983 -> target_system.patch_420cc4 -> target_system.patch_9a13ca
{ "severity": "High", "success": true, "time_to_detect": 4.17 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-354a7e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_2dec" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_420cc4", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_420cc4 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.59 }
{ "attack_vector": "API Endpoint", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-0dbaa0", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_8899" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 4.8 }
{ "attack_vector": "Web Request", "severity": "Medium", "vulnerability_type": "XSS" }
{ "snapshot_id": "SNAP-1f53d0", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "XSS", "impact": "Blocked", "payloads": [ "payload_fb33" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_420cc4
{ "severity": "Medium", "success": true, "time_to_detect": 0.51 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Buffer Overflow" }
{ "snapshot_id": "SNAP-17912e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Buffer Overflow", "impact": "Blocked", "payloads": [ "payload_68e6" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516 -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 4.43 }
{ "attack_vector": "Phishing", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-f4cdc9", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_8a14" ], "steps": [ "target_system.exploit_28b139" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_fd0516", "target_system.patch_031983" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_28b139 -> target_system.patch_9a13ca -> target_system.patch_fd0516 -> target_system.patch_031983
{ "severity": "Critical", "success": true, "time_to_detect": 3.12 }
{ "attack_vector": "Internal Network", "severity": "High", "vulnerability_type": "Broken Auth" }
{ "snapshot_id": "SNAP-64dde1", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Broken Auth", "impact": "Blocked", "payloads": [ "payload_8d6a" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_d8222a", "target_system.patch_28b139", "target_system.patch_fd0516", "target_system.patch_e28172" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_d8222a -> target_system.patch_28b139 -> target_system.patch_fd0516 -> target_system.patch_e28172
{ "severity": "High", "success": true, "time_to_detect": 2.4 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-e20fb6", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_138b" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_9a13ca", "target_system.patch_031983", "target_system.patch_d8222a", "target_system.patch_e28172", "target_system.patch_420cc4" ], "signals": [ "Abnormal SQL pattern", ...
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_9a13ca -> target_system.patch_031983 -> target_system.patch_d8222a -> target_system.patch_e28172 -> target_system.patch_420cc4
{ "severity": "Critical", "success": true, "time_to_detect": 4.38 }
{ "attack_vector": "API Endpoint", "severity": "Critical", "vulnerability_type": "SQL Injection" }
{ "snapshot_id": "SNAP-e8ce7e", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "SQL Injection", "impact": "Blocked", "payloads": [ "payload_4a53" ], "steps": [] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 3.93 }
{ "attack_vector": "Third-Party Library", "severity": "Critical", "vulnerability_type": "Insecure Deserialization" }
{ "snapshot_id": "SNAP-77eaa8", "vulnerable_component": "api_gateway/v1/auth.py" }
defend
{ "attack_vector": "Insecure Deserialization", "impact": "Blocked", "payloads": [ "payload_9f82" ], "steps": [ "target_system.exploit_031983", "target_system.exploit_031983" ] }
{ "detection_method": "WAF Signature Match", "mitigation": "Code Patching", "response_steps": [ "target_system.patch_fd0516", "target_system.patch_e28172", "target_system.patch_fd0516" ], "signals": [ "Abnormal SQL pattern", "High latency" ] }
{ "changes_made": "Parameterized query implementation", "diff": "- query = \"...\" + input\n+ query = \"...\", (input,)", "tests_added": [ "test_sql_injection_payload" ] }
target_system.exploit_031983 -> target_system.patch_fd0516 -> target_system.exploit_031983 -> target_system.patch_e28172 -> target_system.patch_fd0516
{ "severity": "Critical", "success": true, "time_to_detect": 1.73 }