From 84f7f9311024fb8bbe20314e48bb11d219d648a9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Krzysztof=20Zaj=C4=85c?= Date: Wed, 31 Jul 2024 12:21:19 +0200 Subject: [PATCH] How intrusive are the modules --- forti_vuln/forti_vuln.py | 2 ++ karton_dns_reaper/karton_dns_reaper.py | 2 ++ karton_sqlmap/karton_sqlmap.py | 3 ++- karton_ssl_checks/karton_ssl_checks.py | 3 ++- karton_wpscan/karton_wpscan.py | 2 ++ 5 files changed, 10 insertions(+), 2 deletions(-) diff --git a/forti_vuln/forti_vuln.py b/forti_vuln/forti_vuln.py index f3b8c35..31c4061 100644 --- a/forti_vuln/forti_vuln.py +++ b/forti_vuln/forti_vuln.py @@ -3,6 +3,7 @@ import ssl from typing import Optional, Tuple +from artemis import load_risk_class from artemis.binds import Device, TaskStatus, TaskType from artemis.config import Config from artemis.module_base import ArtemisBase @@ -30,6 +31,7 @@ """ +@load_risk_class.load_risk_class(load_risk_class.LoadRiskClass.MEDIUM) class FortiVuln(ArtemisBase): # type: ignore """ Checks FortiOS instance for CVE-2024-21762 vulnerability diff --git a/karton_dns_reaper/karton_dns_reaper.py b/karton_dns_reaper/karton_dns_reaper.py index 05c7cba..d75b70d 100644 --- a/karton_dns_reaper/karton_dns_reaper.py +++ b/karton_dns_reaper/karton_dns_reaper.py @@ -2,11 +2,13 @@ import json import subprocess +from artemis import load_risk_class from artemis.binds import TaskStatus, TaskType from artemis.module_base import ArtemisBase from karton.core import Task +@load_risk_class.load_risk_class(load_risk_class.LoadRiskClass.LOW) class DNSReaper(ArtemisBase): # type: ignore """ Runs DNSReaper diff --git a/karton_sqlmap/karton_sqlmap.py b/karton_sqlmap/karton_sqlmap.py index f1bc52e..03d1fa0 100644 --- a/karton_sqlmap/karton_sqlmap.py +++ b/karton_sqlmap/karton_sqlmap.py @@ -10,7 +10,7 @@ from typing import List, Optional, Tuple import timeout_decorator -from artemis import http_requests +from artemis import http_requests, load_risk_class from artemis.binds import Service, TaskStatus, TaskType from artemis.config import Config from artemis.module_base import ArtemisBase @@ -40,6 +40,7 @@ class FoundSQLInjection: used_tamper_script: Optional[str] = None +@load_risk_class.load_risk_class(load_risk_class.LoadRiskClass.HIGH) class SQLmap(ArtemisBase): # type: ignore """ Runs sqlmap diff --git a/karton_ssl_checks/karton_ssl_checks.py b/karton_ssl_checks/karton_ssl_checks.py index 2953ae3..85e54ab 100644 --- a/karton_ssl_checks/karton_ssl_checks.py +++ b/karton_ssl_checks/karton_ssl_checks.py @@ -7,7 +7,7 @@ import hstspreload import requests -from artemis import http_requests +from artemis import http_requests, load_risk_class from artemis.binds import TaskStatus, TaskType from artemis.config import Config from artemis.domains import is_subdomain @@ -23,6 +23,7 @@ from extra_modules_config import ExtraModulesConfig +@load_risk_class.load_risk_class(load_risk_class.LoadRiskClass.LOW) class SSLChecks(ArtemisBase): # type: ignore """ Runs SSL checks diff --git a/karton_wpscan/karton_wpscan.py b/karton_wpscan/karton_wpscan.py index 36ba444..35a1144 100644 --- a/karton_wpscan/karton_wpscan.py +++ b/karton_wpscan/karton_wpscan.py @@ -3,6 +3,7 @@ import subprocess import urllib.parse +from artemis import load_risk_class from artemis.binds import TaskStatus, TaskType from artemis.module_base import ArtemisBase from karton.core import Task @@ -14,6 +15,7 @@ class ScanningException(Exception): pass +@load_risk_class.load_risk_class(load_risk_class.LoadRiskClass.MEDIUM) class WPScan(ArtemisBase): # type: ignore """ Runs WPScan -> WordPress Vulnerability Scanner