Conversation
This stack of pull requests is managed by Graphite. Learn more about stacking. |
sean-hacker
left a comment
There was a problem hiding this comment.
One question I have here is if this provides 1:1 replacements as written for all the tools that were deleted. I would have preferred that we not delete the old tools and instead just slotted in the nuclei. That would have eased the transition from the existing tools to the new ones.
|
@sean-hacker - this PR currently does not replace all functionality, but I planned on adding the outstanding templates before merging. I ripped out the old code to get a distraction free look into the repo skeleton etc - i've added it back now that the nuclei impl is complete. |
e07beb8 to
2de021b
Compare
| name: Prepare Linux (arm64) | ||
| runs-on: ubuntu-22.04-arm | ||
| steps: | ||
| - uses: actions/[email protected] | ||
| with: | ||
| fetch-depth: 0 | ||
| - name: Generate Fern Go Code | ||
| run: | | ||
| npm install -g fern-api | ||
| fern generate --group local | ||
| env: | ||
| FERN_TOKEN: ${{ secrets.FERN_TOKEN }} | ||
| - uses: actions/setup-go@v5 | ||
| with: | ||
| go-version: ${{ env.GO_VERSION }} | ||
| cache: true | ||
| - uses: goreleaser/goreleaser-action@v4 | ||
| with: | ||
| distribution: goreleaser-pro | ||
| version: latest | ||
| args: >- | ||
| build --single-target --clean --snapshot --timeout 60m | ||
| -f ${{ inputs.goreleaser_config }} ${{ inputs.goreleaser_options }} | ||
| env: | ||
| GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | ||
| GORELEASER_KEY: ${{ secrets.GORELEASER_KEY }} | ||
| GOOS: linux | ||
| GOARCH: arm64 | ||
| - uses: actions/upload-artifact@v4 | ||
| with: | ||
| name: linux-arm64-dist | ||
| path: dist/ | ||
| retention-days: 7 | ||
|
|
||
| prepare-linux-amd64: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
|
I can no longer approve this since I pushed commits. @payoub125 can approve tomorrow |

Nuclei Debut
This is a huge moment for
methodwebtestas we move away from a custom requests and vuln scanning engine towards Nuclei and custom templates that leverage its DSL.This PR also takes this opportunity to perform some high-level organization of the scanning logic - at this stage, this tool is broken down into 2 top level modules:
DAST and Scan High Level Modules:
DAST (discovers previously-unknown vulns) - allows us to potentially eat another security point product (DAST scanners). This module implements a multi-modal fuzzer that gives us the ability to fuzz injection points across param locations header | query | body | cookie | path
Scan - allows us to immediately leverage the power of thousands of templates from the larger security community and exponentially expand our detection surface. We can now detect all vulns with public exploits available between 2000-2025!!
Testing