Create app.py
Browse files
app.py
ADDED
|
@@ -0,0 +1,1107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# app.py (Strategic Agent Service for Hugging Face Spaces - CPU Only, Preload All Models, No ngrok)
|
| 2 |
+
import os
|
| 3 |
+
import json
|
| 4 |
+
import logging
|
| 5 |
+
import numpy as np
|
| 6 |
+
import requests
|
| 7 |
+
from fastapi import FastAPI, HTTPException, Depends, status
|
| 8 |
+
from pydantic import BaseModel, Field, constr
|
| 9 |
+
from sentence_transformers import SentenceTransformer
|
| 10 |
+
from sklearn.metrics.pairwise import cosine_similarity
|
| 11 |
+
from datetime import datetime
|
| 12 |
+
import firebase_admin
|
| 13 |
+
from firebase_admin import credentials, firestore
|
| 14 |
+
from bs4 import BeautifulSoup
|
| 15 |
+
import re
|
| 16 |
+
from typing import List, Dict, Optional, Tuple
|
| 17 |
+
from cachetools import TTLCache
|
| 18 |
+
import gc
|
| 19 |
+
from llama_cpp import Llama
|
| 20 |
+
import asyncio
|
| 21 |
+
import nest_asyncio
|
| 22 |
+
from fastapi.responses import JSONResponse # Added for explicit JSONResponse
|
| 23 |
+
|
| 24 |
+
# Apply nest_asyncio to allow running asyncio.run() in environments with existing event loops
|
| 25 |
+
nest_asyncio.apply()
|
| 26 |
+
|
| 27 |
+
# --- Configuration ---
|
| 28 |
+
# Directory to store downloaded GGUF models within Hugging Face Space's writable space
|
| 29 |
+
DOWNLOAD_DIR = "./downloaded_models/" # Changed to a local directory within the Space
|
| 30 |
+
os.makedirs(DOWNLOAD_DIR, exist_ok=True)
|
| 31 |
+
|
| 32 |
+
# Predefined Hugging Face GGUF model URLs for dynamic loading
|
| 33 |
+
HUGGINGFACE_MODELS = [
|
| 34 |
+
{
|
| 35 |
+
"name": "Foundation-Sec-8B-Q8_0",
|
| 36 |
+
"url": "https://huggingface.co/fdtn-ai/Foundation-Sec-8B-Q8_0-GGUF/resolve/main/foundation-sec-8b-q8_0.gguf"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"name": "Lily-Cybersecurity-7B-v0.2-Q8_0",
|
| 40 |
+
"url": "https://huggingface.co/Nekuromento/Lily-Cybersecurity-7B-v0.2-Q8_0-GGUF/resolve/main/lily-cybersecurity-7b-v0.2-q8_0.gguf"
|
| 41 |
+
},
|
| 42 |
+
{
|
| 43 |
+
"name": "SecurityLLM-GGUF (sarvam-m-q8_0)",
|
| 44 |
+
"url": "https://huggingface.co/QuantFactory/SecurityLLM-GGUF/resolve/main/sarvam-m-q8_0.gguf"
|
| 45 |
+
}
|
| 46 |
+
]
|
| 47 |
+
|
| 48 |
+
DATA_DIR = "./data" # Local data for Hugging Face Space
|
| 49 |
+
DEEP_SEARCH_CACHE_TTL = 3600
|
| 50 |
+
|
| 51 |
+
# --- ngrok Configuration (Removed) ---
|
| 52 |
+
# NGROK_AUTH_TOKEN and NGROK_STRATEGIC_AGENT_TUNNEL_URL are removed
|
| 53 |
+
|
| 54 |
+
# --- Logging Setup ---
|
| 55 |
+
logging.basicConfig(
|
| 56 |
+
level=logging.DEBUG, # Changed from INFO to DEBUG
|
| 57 |
+
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s'
|
| 58 |
+
)
|
| 59 |
+
logger = logging.getLogger(__name__)
|
| 60 |
+
logger.info("Logging initialized with DEBUG level.")
|
| 61 |
+
|
| 62 |
+
# Initialize FastAPI app
|
| 63 |
+
app = FastAPI(
|
| 64 |
+
title="Hugging Face Strategic Agent Service",
|
| 65 |
+
description="Provides knowledge base access and strategic reasoning for the pentest agent on Hugging Face Spaces.",
|
| 66 |
+
version="1.0.0"
|
| 67 |
+
)
|
| 68 |
+
|
| 69 |
+
# Initialize Firebase
|
| 70 |
+
firebase_creds_path = os.getenv("FIREBASE_CREDS_PATH", "cred.json")
|
| 71 |
+
db = None
|
| 72 |
+
if not firebase_admin._apps:
|
| 73 |
+
try:
|
| 74 |
+
if os.path.exists(firebase_creds_path):
|
| 75 |
+
cred = credentials.Certificate(firebase_creds_path)
|
| 76 |
+
firebase_admin.initialize_app(cred)
|
| 77 |
+
db = firestore.client()
|
| 78 |
+
logger.info("Firebase initialized successfully.")
|
| 79 |
+
else:
|
| 80 |
+
logger.warning(f"Firebase credentials file not found at {firebase_creds_path}. Firebase will not be initialized.")
|
| 81 |
+
except Exception as e:
|
| 82 |
+
logger.error(f"Failed to initialize Firebase: {e}. Ensure FIREBASE_CREDS_PATH is set correctly and the file exists.", exc_info=True)
|
| 83 |
+
|
| 84 |
+
# Global LLM instance for Strategic Agent
|
| 85 |
+
strategic_llm: Optional[Llama] = None
|
| 86 |
+
current_strategic_model_url: Optional[str] = None # Now tracks URL, not local path
|
| 87 |
+
|
| 88 |
+
# Supported tools (Strategic Agent needs to know these for command generation)
|
| 89 |
+
SUPPORTED_TOOLS = [
|
| 90 |
+
"nmap", "gobuster", "nikto", "sqlmap", "adb", "frida",
|
| 91 |
+
"drozer", "apktool", "msfconsole", "mobsfscan", "burpsuite",
|
| 92 |
+
"metasploit", "curl", "wget", "hydra", "john", "aircrack-ng"
|
| 93 |
+
]
|
| 94 |
+
|
| 95 |
+
# --- Deep Search Cache ---
|
| 96 |
+
deep_search_cache = TTLCache(maxsize=100, ttl=DEEP_SEARCH_CACHE_TTL)
|
| 97 |
+
|
| 98 |
+
# --- Enhanced System Instruction (English) ---
|
| 99 |
+
SYSTEM_INSTRUCTION = (
|
| 100 |
+
"You are an expert pentest agent. Strictly follow these rules:\n"
|
| 101 |
+
"1. Output ONLY valid shell commands\n"
|
| 102 |
+
"2. NEVER include timestamps, dates, or any text outside commands\n"
|
| 103 |
+
"3. Never repeat previous commands\n"
|
| 104 |
+
"4. Always verify command safety before execution\n\n"
|
| 105 |
+
"Example valid response:\n"
|
| 106 |
+
"nmap -sV 192.168.1.6\n\n"
|
| 107 |
+
"Key Principles:\n"
|
| 108 |
+
"- Never give up until the goal is achieved\n"
|
| 109 |
+
"- Learn from failures and adapt strategies\n"
|
| 110 |
+
"- Leverage all available knowledge and tools\n"
|
| 111 |
+
"- Break complex tasks into smaller achievable steps\n"
|
| 112 |
+
"- Always ensure actions are ethical and within scope\n\n"
|
| 113 |
+
"Available Tools:\n"
|
| 114 |
+
"- nmap: Network scanning and service detection\n"
|
| 115 |
+
"- gobuster: Web directory brute-forcing\n"
|
| 116 |
+
"- nikto: Web server vulnerability scanner\n"
|
| 117 |
+
"- sqlmap: SQL injection testing\n"
|
| 118 |
+
"- adb: Android Debug Bridge\n"
|
| 119 |
+
"- metasploit: Exploitation framework\n\n"
|
| 120 |
+
"Error Handling Examples:\n"
|
| 121 |
+
"Example 1 (Command Failure):\n"
|
| 122 |
+
" If nmap fails because host is down, try: nmap -Pn -sV 192.168.1.6\n"
|
| 123 |
+
"Example 2 (Web Server Error):\n"
|
| 124 |
+
" If web server returns 403, try: gobuster dir -u http://192.168.1.6 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt\n"
|
| 125 |
+
"Example 3 (ADB Connection Failed):\n"
|
| 126 |
+
" If ADB connection fails, try: adb kill-server && adb start-server"
|
| 127 |
+
)
|
| 128 |
+
|
| 129 |
+
# --- Firebase Knowledge Base Integration ---
|
| 130 |
+
class FirebaseKnowledgeBase:
|
| 131 |
+
def __init__(self):
|
| 132 |
+
self.collection = db.collection('knowledge_base') if db else None
|
| 133 |
+
|
| 134 |
+
def query(self, goal: str, phase: str = None, limit: int = 10) -> list:
|
| 135 |
+
if not db or not firebase_admin._apps: # Check if Firebase is initialized
|
| 136 |
+
logger.error("Firestore client not initialized. Cannot query knowledge base.")
|
| 137 |
+
return []
|
| 138 |
+
|
| 139 |
+
# Re-instantiate collection if it's None (e.g., if Firebase init failed initially)
|
| 140 |
+
if not hasattr(self, 'collection') or self.collection is None:
|
| 141 |
+
self.collection = db.collection('knowledge_base')
|
| 142 |
+
|
| 143 |
+
keywords = [goal.lower(), 'android', 'pentest', 'mobile', 'device']
|
| 144 |
+
if phase:
|
| 145 |
+
keywords.append(phase.lower())
|
| 146 |
+
|
| 147 |
+
try:
|
| 148 |
+
query_ref = self.collection
|
| 149 |
+
results = []
|
| 150 |
+
docs = query_ref.stream() # Use query_ref instead of self.collection directly
|
| 151 |
+
|
| 152 |
+
for doc in docs:
|
| 153 |
+
data = doc.to_dict()
|
| 154 |
+
text = f"{data.get('prompt', '').lower()} {data.get('completion', '').lower()} {data.get('metadata', '').lower()}"
|
| 155 |
+
if any(keyword in text for keyword in keywords):
|
| 156 |
+
results.append(data)
|
| 157 |
+
if len(results) >= 10: # Use a fixed limit for stream
|
| 158 |
+
break
|
| 159 |
+
|
| 160 |
+
priority_order = {"high": 1, "medium": 2, "low": 3}
|
| 161 |
+
results.sort(key=lambda x: (
|
| 162 |
+
priority_order.get(x.get('metadata', {}).get('priority', 'low').lower(), 3),
|
| 163 |
+
x.get('metadata', {}).get('timestamp', 0)
|
| 164 |
+
))
|
| 165 |
+
|
| 166 |
+
return results[:10] # Ensure limit is applied
|
| 167 |
+
except Exception as e:
|
| 168 |
+
logger.error(f"Failed to query knowledge base: {e}", exc_info=True)
|
| 169 |
+
return []
|
| 170 |
+
|
| 171 |
+
# --- RAG Knowledge Index ---
|
| 172 |
+
class KnowledgeIndex:
|
| 173 |
+
def __init__(self, model_name="all-MiniLM-L6-v2"):
|
| 174 |
+
self.model = SentenceTransformer(
|
| 175 |
+
model_name,
|
| 176 |
+
cache_folder=os.path.join(DATA_DIR, "hf_cache") # Use local data dir for cache
|
| 177 |
+
)
|
| 178 |
+
self.knowledge_base = []
|
| 179 |
+
os.makedirs(DATA_DIR, exist_ok=True)
|
| 180 |
+
self.load_knowledge_from_file(os.path.join(DATA_DIR, 'knowledge_base.json'))
|
| 181 |
+
|
| 182 |
+
def load_knowledge_from_file(self, file_path):
|
| 183 |
+
logger.debug(f"Attempting to load knowledge from file: {file_path}")
|
| 184 |
+
if os.path.exists(file_path):
|
| 185 |
+
try:
|
| 186 |
+
with open(file_path, 'r', encoding='utf-8') as f:
|
| 187 |
+
data = json.load(f)
|
| 188 |
+
if not isinstance(data, list):
|
| 189 |
+
logger.error("Knowledge base file is not a list. Please check the file format.")
|
| 190 |
+
return
|
| 191 |
+
for item in data:
|
| 192 |
+
if isinstance(item, dict):
|
| 193 |
+
text = item.get('text', '')
|
| 194 |
+
source = item.get('source', 'local')
|
| 195 |
+
elif isinstance(item, str):
|
| 196 |
+
text = item
|
| 197 |
+
source = 'local'
|
| 198 |
+
else:
|
| 199 |
+
logger.warning(f"Skipping unsupported item type: {type(item)}")
|
| 200 |
+
continue
|
| 201 |
+
if text:
|
| 202 |
+
embedding = self.model.encode(text).tolist()
|
| 203 |
+
self.knowledge_base.append({'text': text, 'embedding': embedding, 'source': source})
|
| 204 |
+
logger.info(f"Loaded {len(self.knowledge_base)} items into RAG knowledge base.")
|
| 205 |
+
except Exception as e:
|
| 206 |
+
logger.error(f"Error loading knowledge from {file_path}: {e}", exc_info=True)
|
| 207 |
+
else:
|
| 208 |
+
logger.warning(f"Knowledge base file not found: {file_path}. RAG will operate on an empty knowledge base.")
|
| 209 |
+
try:
|
| 210 |
+
with open(file_path, 'w', encoding='utf-8') as f:
|
| 211 |
+
json.dump([], f)
|
| 212 |
+
logger.info(f"Created empty knowledge base file at: {file_path}")
|
| 213 |
+
except Exception as e:
|
| 214 |
+
logger.error(f"Error creating empty knowledge base file at {file_path}: {e}", exc_info=True)
|
| 215 |
+
|
| 216 |
+
def retrieve(self, query: str, top_k: int = 5) -> List[Dict]:
|
| 217 |
+
if not self.knowledge_base:
|
| 218 |
+
logger.debug("Knowledge base is empty, no RAG retrieval possible.")
|
| 219 |
+
return []
|
| 220 |
+
|
| 221 |
+
try:
|
| 222 |
+
query_embedding = self.model.encode(query).reshape(1, -1)
|
| 223 |
+
embeddings = np.array([item['embedding'] for item in self.knowledge_base])
|
| 224 |
+
|
| 225 |
+
similarities = cosine_similarity(query_embedding, embeddings)[0]
|
| 226 |
+
top_indices = similarities.argsort()[-top_k:][::-1]
|
| 227 |
+
|
| 228 |
+
results = []
|
| 229 |
+
for i in top_indices:
|
| 230 |
+
results.append({
|
| 231 |
+
"text": self.knowledge_base[i]['text'],
|
| 232 |
+
"similarity": similarities[i],
|
| 233 |
+
"source": self.knowledge_base[i].get('source', 'RAG')
|
| 234 |
+
})
|
| 235 |
+
logger.debug(f"RAG retrieved {len(results)} results for query: '{query}'")
|
| 236 |
+
return results
|
| 237 |
+
except Exception as e:
|
| 238 |
+
logger.error(f"Error during RAG retrieval for query '{query}': {e}", exc_info=True)
|
| 239 |
+
return []
|
| 240 |
+
|
| 241 |
+
# --- Deep Search Engine ---
|
| 242 |
+
class DeepSearchEngine:
|
| 243 |
+
def __init__(self):
|
| 244 |
+
self.headers = {
|
| 245 |
+
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36"
|
| 246 |
+
}
|
| 247 |
+
|
| 248 |
+
def search_device_info(self, device_info: str, os_version: str) -> dict:
|
| 249 |
+
logger.debug(f"Performing deep search for device: {device_info}, OS: {os_version}")
|
| 250 |
+
results = {
|
| 251 |
+
"device": device_info,
|
| 252 |
+
"os_version": os_version,
|
| 253 |
+
"vulnerabilities": [],
|
| 254 |
+
"exploits": [],
|
| 255 |
+
"recommendations": []
|
| 256 |
+
}
|
| 257 |
+
try:
|
| 258 |
+
cve_results = self.search_cve(device_info, os_version)
|
| 259 |
+
results["vulnerabilities"] = cve_results
|
| 260 |
+
exploit_results = self.search_exploits(device_info, os_version)
|
| 261 |
+
results["exploits"] = exploit_results
|
| 262 |
+
recommendations = self.get_security_recommendations(os_version)
|
| 263 |
+
results["recommendations"] = recommendations
|
| 264 |
+
logger.debug("Deep search completed.")
|
| 265 |
+
except Exception as e:
|
| 266 |
+
logger.error(f"Deep search failed: {e}", exc_info=True)
|
| 267 |
+
return results
|
| 268 |
+
|
| 269 |
+
def search_cve(self, device: str, os_version: str) -> list:
|
| 270 |
+
cves = []
|
| 271 |
+
try:
|
| 272 |
+
query = f"{device} {os_version} CVE"
|
| 273 |
+
search_url = f"https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword={query}"
|
| 274 |
+
logger.debug(f"Searching CVE Mitre: {search_url}")
|
| 275 |
+
response = requests.get(search_url, headers=self.headers)
|
| 276 |
+
response.raise_for_status() # Raise an exception for HTTP errors
|
| 277 |
+
if response.status_code == 200:
|
| 278 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 279 |
+
table = soup.find('div', id='TableWithRules')
|
| 280 |
+
if table:
|
| 281 |
+
rows = table.find_all('tr')[1:]
|
| 282 |
+
for row in rows:
|
| 283 |
+
cols = row.find_all('td')
|
| 284 |
+
if len(cols) >= 2:
|
| 285 |
+
cve_id = cols[0].get_text(strip=True)
|
| 286 |
+
description = cols[1].get_text(strip=True)
|
| 287 |
+
cves.append({
|
| 288 |
+
"cve_id": cve_id,
|
| 289 |
+
"description": description,
|
| 290 |
+
"source": "CVE Mitre"
|
| 291 |
+
})
|
| 292 |
+
logger.debug(f"Found {len(cves)} CVEs.")
|
| 293 |
+
return cves[:10]
|
| 294 |
+
except Exception as e:
|
| 295 |
+
logger.error(f"CVE search failed: {e}", exc_info=True)
|
| 296 |
+
return []
|
| 297 |
+
|
| 298 |
+
def search_exploits(self, device: str, os_version: str) -> list:
|
| 299 |
+
exploits = []
|
| 300 |
+
try:
|
| 301 |
+
query = f"{device} {os_version}"
|
| 302 |
+
search_url = f"https://www.exploit-db.com/search?q={query}"
|
| 303 |
+
logger.debug(f"Searching ExploitDB: {search_url}")
|
| 304 |
+
response = requests.get(search_url, headers=self.headers)
|
| 305 |
+
response.raise_for_status() # Raise an exception for HTTP errors
|
| 306 |
+
if response.status_code == 200:
|
| 307 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 308 |
+
cards = soup.select('.card .card-title')
|
| 309 |
+
for card in cards:
|
| 310 |
+
title = card.get_text(strip=True)
|
| 311 |
+
link = card.find('a')['href']
|
| 312 |
+
if not link.startswith('http'):
|
| 313 |
+
link = f"https://www.exploit-db.com{link}"
|
| 314 |
+
exploits.append({
|
| 315 |
+
"title": title,
|
| 316 |
+
"link": link,
|
| 317 |
+
"source": "ExploitDB"
|
| 318 |
+
})
|
| 319 |
+
logger.debug(f"Found {len(exploits)} exploits.")
|
| 320 |
+
return exploits[:10]
|
| 321 |
+
except Exception as e:
|
| 322 |
+
logger.error(f"Exploit search failed: {e}", exc_info=True)
|
| 323 |
+
return []
|
| 324 |
+
|
| 325 |
+
def get_security_recommendations(self, os_version: str) -> list:
|
| 326 |
+
recommendations = []
|
| 327 |
+
try:
|
| 328 |
+
logger.debug(f"Getting security recommendations for OS: {os_version}")
|
| 329 |
+
if "android" in os_version.lower():
|
| 330 |
+
url = "https://source.android.com/docs/security/bulletin"
|
| 331 |
+
response = requests.get(url, headers=self.headers)
|
| 332 |
+
response.raise_for_status()
|
| 333 |
+
if response.status_code == 200:
|
| 334 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 335 |
+
versions = soup.select('.devsite-article-body h2')
|
| 336 |
+
for version in versions:
|
| 337 |
+
if os_version in version.get_text():
|
| 338 |
+
next_ul = version.find_next('ul')
|
| 339 |
+
if next_ul:
|
| 340 |
+
items = next_ul.select('li')
|
| 341 |
+
for item in items:
|
| 342 |
+
recommendations.append(item.get_text(strip=True))
|
| 343 |
+
elif "ios" in os_version.lower():
|
| 344 |
+
url = "https://support.apple.com/en-us/HT201222"
|
| 345 |
+
response = requests.get(url, headers=self.headers)
|
| 346 |
+
response.raise_for_status()
|
| 347 |
+
if response.status_code == 200:
|
| 348 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 349 |
+
sections = soup.select('#sections')
|
| 350 |
+
for section in sections:
|
| 351 |
+
if os_version in section.get_text():
|
| 352 |
+
items = section.select('li')
|
| 353 |
+
for item in items:
|
| 354 |
+
recommendations.append(item.get_text(strip=True))
|
| 355 |
+
logger.debug(f"Found {len(recommendations)} recommendations.")
|
| 356 |
+
return recommendations[:5]
|
| 357 |
+
except Exception as e:
|
| 358 |
+
logger.error(f"Security recommendations search failed: {e}", exc_info=True)
|
| 359 |
+
return []
|
| 360 |
+
|
| 361 |
+
def search_public_resources(self, device_info: str) -> list:
|
| 362 |
+
resources = []
|
| 363 |
+
try:
|
| 364 |
+
logger.debug(f"Searching public resources for device: {device_info}")
|
| 365 |
+
github_url = f"https://github.com/search?q={device_info.replace(' ', '+')}+pentest"
|
| 366 |
+
response = requests.get(github_url, headers=self.headers)
|
| 367 |
+
response.raise_for_status()
|
| 368 |
+
if response.status_code == 200:
|
| 369 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 370 |
+
repos = soup.select('.repo-list-item')
|
| 371 |
+
for repo in repos:
|
| 372 |
+
title = repo.select_one('.v-align-middle').get_text(strip=True)
|
| 373 |
+
description = repo.select_one('.mb-1').get_text(strip=True) if repo.select_one('.mb-1') else ""
|
| 374 |
+
url = f"https://github.com{repo.select_one('.v-align-middle')['href']}"
|
| 375 |
+
resources.append({
|
| 376 |
+
"title": title,
|
| 377 |
+
"description": description,
|
| 378 |
+
"url": url,
|
| 379 |
+
"source": "GitHub"
|
| 380 |
+
})
|
| 381 |
+
forum_url = f"https://hackforums.net/search.php?action=finduserthreads&keywords={device_info.replace(' ', '+')}"
|
| 382 |
+
response = requests.get(forum_url, headers=self.headers)
|
| 383 |
+
response.raise_for_status()
|
| 384 |
+
if response.status_code == 200:
|
| 385 |
+
soup = BeautifulSoup(response.text, 'html.parser')
|
| 386 |
+
threads = soup.select('.thread')
|
| 387 |
+
for thread in threads:
|
| 388 |
+
title = thread.select_one('.threadtitle').get_text(strip=True)
|
| 389 |
+
url = f"https://hackforums.net{thread.select_one('.threadtitle a')['href']}"
|
| 390 |
+
resources.append({
|
| 391 |
+
"title": title,
|
| 392 |
+
"description": "Forum discussion",
|
| 393 |
+
"url": url,
|
| 394 |
+
"source": "HackForums"
|
| 395 |
+
})
|
| 396 |
+
logger.debug(f"Found {len(resources)} public resources.")
|
| 397 |
+
return resources[:10]
|
| 398 |
+
except Exception as e:
|
| 399 |
+
logger.error(f"Public resources search failed: {e}", exc_info=True)
|
| 400 |
+
return []
|
| 401 |
+
|
| 402 |
+
# --- Initialize Services (Local to Strategic Agent) ---
|
| 403 |
+
firebase_kb = FirebaseKnowledgeBase()
|
| 404 |
+
rag_index = KnowledgeIndex()
|
| 405 |
+
deep_search_engine = DeepSearchEngine()
|
| 406 |
+
|
| 407 |
+
# --- Strategic Agent Brain (formerly SmartExecutionEngine logic) ---
|
| 408 |
+
class StrategicAgentBrain:
|
| 409 |
+
def __init__(self):
|
| 410 |
+
self.llm: Optional[Llama] = None
|
| 411 |
+
self.current_goal: Optional[str] = None
|
| 412 |
+
self.current_phase: str = "initial_reconnaissance"
|
| 413 |
+
self.current_plan: List[Dict] = []
|
| 414 |
+
self.current_phase_index: int = 0
|
| 415 |
+
self.identified_vulnerabilities: List[Dict] = []
|
| 416 |
+
self.gathered_info: List[str] = []
|
| 417 |
+
self.command_retry_counts: Dict[str, int] = {}
|
| 418 |
+
self.conversation_history: List[Dict] = []
|
| 419 |
+
self.used_commands = set()
|
| 420 |
+
self.execution_history = []
|
| 421 |
+
self.goal_achieved = False
|
| 422 |
+
self.no_progress_count = 0
|
| 423 |
+
self.react_cycle_count = 0
|
| 424 |
+
self.loaded_model_name: Optional[str] = None # To store the name of the loaded model
|
| 425 |
+
logger.info("StrategicAgentBrain initialized.")
|
| 426 |
+
|
| 427 |
+
async def load_strategic_llm(self, model_url: str):
|
| 428 |
+
global strategic_llm, current_strategic_model_url
|
| 429 |
+
logger.info(f"Attempting to load strategic LLM from URL: {model_url}")
|
| 430 |
+
|
| 431 |
+
# Determine local path for the model
|
| 432 |
+
model_filename = model_url.split('/')[-1]
|
| 433 |
+
local_model_path = os.path.join(DOWNLOAD_DIR, model_filename)
|
| 434 |
+
|
| 435 |
+
if strategic_llm and current_strategic_model_url == model_url:
|
| 436 |
+
logger.info(f"Strategic LLM model from {model_url} is already loaded.")
|
| 437 |
+
self.llm = strategic_llm
|
| 438 |
+
return True, f"Model '{self.loaded_model_name}' is already loaded."
|
| 439 |
+
|
| 440 |
+
# If a model is currently loaded, unload it first
|
| 441 |
+
if strategic_llm:
|
| 442 |
+
await self.unload_strategic_llm()
|
| 443 |
+
|
| 444 |
+
# Ensure model is downloaded before attempting to load
|
| 445 |
+
if not os.path.exists(local_model_path):
|
| 446 |
+
logger.info(f"Model not found locally. Attempting to download from {model_url} to {local_model_path}...")
|
| 447 |
+
try:
|
| 448 |
+
response = requests.get(model_url, stream=True)
|
| 449 |
+
response.raise_for_status()
|
| 450 |
+
with open(local_model_path, 'wb') as f:
|
| 451 |
+
for chunk in response.iter_content(chunk_size=8192):
|
| 452 |
+
f.write(chunk)
|
| 453 |
+
logger.info(f"Model downloaded successfully to {local_model_path}.")
|
| 454 |
+
except Exception as e:
|
| 455 |
+
logger.error(f"Failed to download model from {model_url}: {e}", exc_info=True)
|
| 456 |
+
return False, f"Failed to download model: {str(e)}"
|
| 457 |
+
|
| 458 |
+
try:
|
| 459 |
+
logger.info(f"Loading Strategic LLM model from {local_model_path}...")
|
| 460 |
+
strategic_llm = Llama(
|
| 461 |
+
model_path=local_model_path,
|
| 462 |
+
n_ctx=3096,
|
| 463 |
+
n_gpu_layers=0, # Explicitly set to 0 for CPU-only
|
| 464 |
+
n_threads=os.cpu_count(), # Use all available CPU threads
|
| 465 |
+
n_batch=512,
|
| 466 |
+
verbose=False
|
| 467 |
+
)
|
| 468 |
+
current_strategic_model_url = model_url
|
| 469 |
+
self.llm = strategic_llm
|
| 470 |
+
self.loaded_model_name = model_filename # Store the filename
|
| 471 |
+
logger.info(f"Strategic LLM model {model_filename} loaded successfully (CPU-only).")
|
| 472 |
+
return True, f"Model '{model_filename}' loaded successfully (CPU-only)."
|
| 473 |
+
except Exception as e:
|
| 474 |
+
logger.error(f"Failed to load Strategic LLM model from {local_model_path}: {e}", exc_info=True)
|
| 475 |
+
strategic_llm = None
|
| 476 |
+
current_strategic_model_url = None
|
| 477 |
+
self.llm = None
|
| 478 |
+
self.loaded_model_name = None
|
| 479 |
+
return False, f"Failed to load model: {str(e)}"
|
| 480 |
+
|
| 481 |
+
async def unload_strategic_llm(self):
|
| 482 |
+
global strategic_llm, current_strategic_model_url
|
| 483 |
+
if strategic_llm:
|
| 484 |
+
logger.info("Unloading Strategic LLM model...")
|
| 485 |
+
del strategic_llm
|
| 486 |
+
strategic_llm = None
|
| 487 |
+
current_strategic_model_url = None
|
| 488 |
+
self.llm = None
|
| 489 |
+
self.loaded_model_name = None
|
| 490 |
+
gc.collect()
|
| 491 |
+
logger.info("Strategic LLM model unloaded.")
|
| 492 |
+
|
| 493 |
+
def _get_rag_context(self, query: str) -> str:
|
| 494 |
+
results = rag_index.retrieve(query)
|
| 495 |
+
if not results:
|
| 496 |
+
return ""
|
| 497 |
+
rag_context = "Relevant Knowledge for Current Context:\n"
|
| 498 |
+
for i, result in enumerate(results):
|
| 499 |
+
text = result.get('text', '') or result.get('completion', '')
|
| 500 |
+
source = result.get('source', 'RAG')
|
| 501 |
+
rag_context += f"{i+1}. [{source}] {text}\n"
|
| 502 |
+
return rag_context
|
| 503 |
+
|
| 504 |
+
def _get_firebase_knowledge(self, goal: str, phase: str = None) -> str:
|
| 505 |
+
if not db or not firebase_admin._apps: # Check if Firebase is initialized
|
| 506 |
+
logger.error("Firestore client not initialized. Cannot query knowledge base.")
|
| 507 |
+
return ""
|
| 508 |
+
|
| 509 |
+
# Re-instantiate collection if it's None (e.g., if Firebase init failed initially)
|
| 510 |
+
if not hasattr(self, 'collection') or self.collection is None:
|
| 511 |
+
self.collection = db.collection('knowledge_base')
|
| 512 |
+
|
| 513 |
+
keywords = [goal.lower(), 'android', 'pentest', 'mobile', 'device']
|
| 514 |
+
if phase:
|
| 515 |
+
keywords.append(phase.lower())
|
| 516 |
+
|
| 517 |
+
try:
|
| 518 |
+
query_ref = self.collection
|
| 519 |
+
results = []
|
| 520 |
+
docs = query_ref.stream() # Use query_ref instead of self.collection directly
|
| 521 |
+
|
| 522 |
+
for doc in docs:
|
| 523 |
+
data = doc.to_dict()
|
| 524 |
+
text = f"{data.get('prompt', '').lower()} {data.get('completion', '').lower()} {data.get('metadata', '').lower()}"
|
| 525 |
+
if any(keyword in text for keyword in keywords):
|
| 526 |
+
results.append(data)
|
| 527 |
+
if len(results) >= 10: # Use a fixed limit for stream
|
| 528 |
+
break
|
| 529 |
+
|
| 530 |
+
priority_order = {"high": 1, "medium": 2, "low": 3}
|
| 531 |
+
results.sort(key=lambda x: (
|
| 532 |
+
priority_order.get(x.get('metadata', {}).get('priority', 'low').lower(), 3),
|
| 533 |
+
x.get('metadata', {}).get('timestamp', 0)
|
| 534 |
+
))
|
| 535 |
+
|
| 536 |
+
return results[:10] # Ensure limit is applied
|
| 537 |
+
except Exception as e:
|
| 538 |
+
logger.error(f"Failed to query knowledge base: {e}", exc_info=True)
|
| 539 |
+
return ""
|
| 540 |
+
|
| 541 |
+
def extract_device_info(self) -> str:
|
| 542 |
+
for info in self.gathered_info:
|
| 543 |
+
if "model" in info.lower() or "device" in info.lower():
|
| 544 |
+
match = re.search(r'(?:model|device)\s*[:=]\s*([^\n]+)', info, re.IGNORECASE)
|
| 545 |
+
if match:
|
| 546 |
+
return match.group(1).strip()
|
| 547 |
+
ip_match = re.search(r'\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b', self.current_goal or "")
|
| 548 |
+
return ip_match.group(0) if ip_match else "Unknown Device"
|
| 549 |
+
|
| 550 |
+
def extract_os_version(self) -> str:
|
| 551 |
+
for info in self.gathered_info:
|
| 552 |
+
if "android" in info.lower() or "ios" in info.lower() or "os" in info.lower():
|
| 553 |
+
android_match = re.search(r'android\s+(\d+(?:\.\d+)+)', info, re.IGNORECASE)
|
| 554 |
+
if android_match:
|
| 555 |
+
return f"Android {android_match.group(1)}"
|
| 556 |
+
ios_match = re.search(r'ios\s+(\d+(?:\.\d+)+)', info, re.IGNORECASE)
|
| 557 |
+
if ios_match:
|
| 558 |
+
return f"iOS {ios_match.group(1)}"
|
| 559 |
+
linux_match = re.search(r'linux\s+kernel\s+(\d+\.\d+\.\d+)', info, re.IGNORECASE)
|
| 560 |
+
if linux_match:
|
| 561 |
+
return f"Linux {linux_match.group(1)}"
|
| 562 |
+
return "Unknown OS Version"
|
| 563 |
+
|
| 564 |
+
def format_deep_search_results(self, results: dict) -> str:
|
| 565 |
+
context = "Deep Search Results:\n"
|
| 566 |
+
context += f"Device: {results.get('device', 'Unknown')}\n"
|
| 567 |
+
context += f"OS Version: {results.get('os_version', 'Unknown')}\n\n"
|
| 568 |
+
if results.get('vulnerabilities'):
|
| 569 |
+
context += "Discovered Vulnerabilities:\n"
|
| 570 |
+
for i, vuln in enumerate(results['vulnerabilities'][:5], 1):
|
| 571 |
+
context += f"{i}. {vuln.get('cve_id', 'CVE-XXXX-XXXX')}: {vuln.get('description', 'No description')}\n"
|
| 572 |
+
context += "\n"
|
| 573 |
+
if results.get('exploits'):
|
| 574 |
+
context += "Available Exploits:\n"
|
| 575 |
+
for i, exploit in enumerate(results['exploits'][:5], 1):
|
| 576 |
+
context += f"{i}. {exploit.get('title', 'Untitled exploit')} [Source: {exploit.get('source', 'Unknown')}]\n"
|
| 577 |
+
context += "\n"
|
| 578 |
+
if results.get('recommendations'):
|
| 579 |
+
context += "Security Recommendations:\n"
|
| 580 |
+
for i, rec in enumerate(results['recommendations'][:3], 1):
|
| 581 |
+
context += f"{i}. {rec}\n"
|
| 582 |
+
context += "\n"
|
| 583 |
+
if results.get('public_resources'):
|
| 584 |
+
context += "Public Resources:\n"
|
| 585 |
+
for i, res in enumerate(results['public_resources'][:3], 1):
|
| 586 |
+
context += f"{i}. {res.get('title', 'Untitled resource')} [Source: {res.get('source', 'Unknown')}]\n"
|
| 587 |
+
return context
|
| 588 |
+
|
| 589 |
+
def generate_deep_search_prompt(self, context: str) -> str:
|
| 590 |
+
return f"""
|
| 591 |
+
You are an expert pentester. Below are deep search results for the target device.
|
| 592 |
+
Use this information to generate the next penetration testing command.{context}
|
| 593 |
+
|
| 594 |
+
Current Goal: {self.current_goal}
|
| 595 |
+
Current Phase: {self.current_phase}
|
| 596 |
+
|
| 597 |
+
Recent Command History:{', '.join(list(self.used_commands)[-3:]) if self.used_commands else 'None'}
|
| 598 |
+
|
| 599 |
+
Based on this information, what is the SINGLE MOST EFFECTIVE shell command to execute next?
|
| 600 |
+
Focus on exploiting the most critical vulnerabilities or gathering more information.
|
| 601 |
+
|
| 602 |
+
Response Format:
|
| 603 |
+
Command: <your_command_here>
|
| 604 |
+
"""
|
| 605 |
+
|
| 606 |
+
def _generate_llm_prompt(self) -> str:
|
| 607 |
+
rag_context = self._get_rag_context(f"{self.current_goal} {self.current_phase}")
|
| 608 |
+
firebase_knowledge = self._get_firebase_knowledge(self.current_goal, self.current_phase)
|
| 609 |
+
|
| 610 |
+
history_context = "\n".join(
|
| 611 |
+
f"{entry['role']}: {entry['content']}" for entry in self.conversation_history[-2:]
|
| 612 |
+
)
|
| 613 |
+
|
| 614 |
+
execution_history = "\n".join(
|
| 615 |
+
f"Command: {res['command']}\nResult: {res['output'][:100]}...\nSuccess: {res['success']}"
|
| 616 |
+
for res in self.execution_history[-2:]
|
| 617 |
+
) if self.execution_history else "No previous results."
|
| 618 |
+
|
| 619 |
+
strategic_advice = self._get_rag_context(self.current_phase) # Using RAG for strategic advice too
|
| 620 |
+
|
| 621 |
+
def shorten_text(text, max_length=300):
|
| 622 |
+
if len(text) > max_length:
|
| 623 |
+
return text[:max_length] + "... [truncated]"
|
| 624 |
+
return text
|
| 625 |
+
|
| 626 |
+
rag_context = shorten_text(rag_context, max_length=200)
|
| 627 |
+
firebase_knowledge = shorten_text(firebase_knowledge, max_length=200)
|
| 628 |
+
strategic_advice = shorten_text(strategic_advice, max_length=100)
|
| 629 |
+
history_context = shorten_text(history_context, max_length=150)
|
| 630 |
+
execution_history = shorten_text(execution_history, max_length=500)
|
| 631 |
+
|
| 632 |
+
prompt = f"""
|
| 633 |
+
System Instructions: {SYSTEM_INSTRUCTION}
|
| 634 |
+
|
| 635 |
+
Current Goal: '{self.current_goal}'
|
| 636 |
+
Current Phase: {self.current_phase} - {self.current_plan[self.current_phase_index]['objective'] if self.current_plan and self.current_phase_index < len(self.current_plan) else 'No objective'}
|
| 637 |
+
|
| 638 |
+
Based on the following knowledge and previous results, generate the SINGLE, VALID SHELL COMMAND to advance the penetration testing process.
|
| 639 |
+
|
| 640 |
+
**Knowledge from External Services (RAG & Firebase):**
|
| 641 |
+
{rag_context}
|
| 642 |
+
{firebase_knowledge}
|
| 643 |
+
|
| 644 |
+
**Previous Execution Results:**
|
| 645 |
+
{execution_history}
|
| 646 |
+
|
| 647 |
+
**Recent Conversation History:**
|
| 648 |
+
{history_context}
|
| 649 |
+
|
| 650 |
+
**Strategic Advice for Current Phase:**
|
| 651 |
+
{strategic_advice}
|
| 652 |
+
|
| 653 |
+
***CRITICAL RULES FOR OUTPUT:***
|
| 654 |
+
1. **OUTPUT ONLY THE COMMAND.**
|
| 655 |
+
2. **DO NOT INCLUDE ANY REASONING, THOUGHTS, EXPLANATIONS, OR ANY OTHER TEXT.**
|
| 656 |
+
3. The command MUST be directly executable in a Linux terminal.
|
| 657 |
+
4. Avoid repeating these recent commands: {', '.join(list(self.used_commands)[-3:]) if self.used_commands else 'None'}
|
| 658 |
+
5. If the previous command failed, try a different approach or a related tool.
|
| 659 |
+
6. For the 'android_enumeration' phase, prioritize ADB commands.
|
| 660 |
+
|
| 661 |
+
Example valid commands for initial reconnaissance of an Android phone:
|
| 662 |
+
nmap -sV -Pn 192.168.1.14
|
| 663 |
+
adb devices
|
| 664 |
+
adb connect 192.168.1.14:5555
|
| 665 |
+
|
| 666 |
+
Command:
|
| 667 |
+
"""
|
| 668 |
+
return prompt
|
| 669 |
+
|
| 670 |
+
def _get_llm_response(self, custom_prompt: str = None) -> str:
|
| 671 |
+
if not self.llm:
|
| 672 |
+
logger.error("Strategic LLM instance is None. Cannot get response. Please load a model first.")
|
| 673 |
+
target_ip_match = re.search(r'\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b', self.current_goal or "")
|
| 674 |
+
target_ip = target_ip_match.group(0) if target_ip_match else "192.168.1.1"
|
| 675 |
+
return f"Command: echo 'No LLM loaded. Please load a model from settings. Fallback: nmap -sV -Pn {target_ip}'"
|
| 676 |
+
|
| 677 |
+
prompt = custom_prompt if custom_prompt else self._generate_llm_prompt()
|
| 678 |
+
|
| 679 |
+
logger.info(f"Sending prompt to Strategic LLM:\n{prompt[:500]}...")
|
| 680 |
+
|
| 681 |
+
try:
|
| 682 |
+
response = self.llm(
|
| 683 |
+
prompt,
|
| 684 |
+
max_tokens=512,
|
| 685 |
+
temperature=0.3,
|
| 686 |
+
stop=["\n"]
|
| 687 |
+
)
|
| 688 |
+
llm_response = response['choices'][0]['text'].strip()
|
| 689 |
+
logger.info(f"Strategic LLM raw response: {llm_response}")
|
| 690 |
+
|
| 691 |
+
if not llm_response:
|
| 692 |
+
logger.warning("Strategic LLM returned an empty response. Using fallback command.")
|
| 693 |
+
target_ip_match = re.search(r'\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b', self.current_goal or "")
|
| 694 |
+
target_ip = target_ip_match.group(0) if target_ip_match else "192.168.1.1"
|
| 695 |
+
return f"Command: nmap -sV -Pn {target_ip}"
|
| 696 |
+
|
| 697 |
+
return llm_response
|
| 698 |
+
except Exception as e:
|
| 699 |
+
logger.error(f"Error during Strategic LLM inference: {e}", exc_info=True)
|
| 700 |
+
logger.warning("Strategic LLM inference failed. Using fallback command.")
|
| 701 |
+
target_ip_match = re.search(r'\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b', self.current_goal or "")
|
| 702 |
+
target_ip = target_ip_match.group(0) if target_ip_match else "192.168.1.1"
|
| 703 |
+
return f"Command: nmap -sV -Pn {target_ip}"
|
| 704 |
+
|
| 705 |
+
def parse_llm_response(self, response: str) -> str:
|
| 706 |
+
logger.info(f"Attempting to parse LLM response: '{response}'")
|
| 707 |
+
command = None
|
| 708 |
+
try:
|
| 709 |
+
code_block = re.search(r'```(?:bash|sh)?\s*([\s\S]*?)```', response)
|
| 710 |
+
if code_block:
|
| 711 |
+
command = code_block.group(1).strip()
|
| 712 |
+
logger.info(f"Command extracted from code block: '{command}'")
|
| 713 |
+
|
| 714 |
+
if not command:
|
| 715 |
+
command_match = re.search(r'^\s*Command\s*:\s*(.+)$', response, re.MULTILINE | re.IGNORECASE)
|
| 716 |
+
if command_match:
|
| 717 |
+
command = command_match.group(1).strip()
|
| 718 |
+
logger.info(f"Command extracted from 'Command:' line: '{command}'")
|
| 719 |
+
|
| 720 |
+
if not command:
|
| 721 |
+
stripped_response = response.strip()
|
| 722 |
+
if any(stripped_response.startswith(tool) for tool in SUPPORTED_TOOLS):
|
| 723 |
+
command = stripped_response
|
| 724 |
+
logger.info(f"Command extracted as direct supported tool command: '{command}'")
|
| 725 |
+
|
| 726 |
+
if command:
|
| 727 |
+
original_command = command
|
| 728 |
+
command = re.sub(r'^\s*(Command|Answer|Note|Result)\s*[:.-]?\s*', '', command, flags=re.IGNORECASE).strip()
|
| 729 |
+
logger.info(f"Cleaned command: from '{original_command}' to '{command}'")
|
| 730 |
+
|
| 731 |
+
if not re.match(r'^[a-zA-Z0-9_./:;= \-\'"\s]+$', command):
|
| 732 |
+
logger.error(f"Invalid command characters detected after cleanup: '{command}'")
|
| 733 |
+
return None
|
| 734 |
+
|
| 735 |
+
if re.search(r'(reason|thought|explanation|rationale|note|result):', command, re.IGNORECASE):
|
| 736 |
+
logger.warning(f"Command '{command}' appears to be reasoning/explanation. Rejecting.")
|
| 737 |
+
return None
|
| 738 |
+
|
| 739 |
+
if command not in self.used_commands:
|
| 740 |
+
self.used_commands.add(command)
|
| 741 |
+
logger.info(f"Returning valid and new command: '{command}'")
|
| 742 |
+
return command
|
| 743 |
+
else:
|
| 744 |
+
logger.warning(f"Command '{command}' already used. Skipping.")
|
| 745 |
+
return None
|
| 746 |
+
else:
|
| 747 |
+
logger.warning("No valid command could be extracted from LLM response based on strict rules.")
|
| 748 |
+
return None
|
| 749 |
+
except Exception as e:
|
| 750 |
+
logger.error(f"Error parsing LLM response: {e}", exc_info=True)
|
| 751 |
+
return None
|
| 752 |
+
|
| 753 |
+
def set_goal(self, goal: str):
|
| 754 |
+
self.current_goal = goal
|
| 755 |
+
self.goal_achieved = False
|
| 756 |
+
self.react_cycle_count = 0
|
| 757 |
+
self.no_progress_count = 0
|
| 758 |
+
|
| 759 |
+
self.current_plan = self._generate_strategic_plan(goal)
|
| 760 |
+
self.current_phase_index = 0
|
| 761 |
+
self.identified_vulnerabilities = []
|
| 762 |
+
self.gathered_info = []
|
| 763 |
+
self.command_retry_counts = {}
|
| 764 |
+
self.conversation_history = [{"role": "user", "content": f"New goal set: {goal}"}]
|
| 765 |
+
self.used_commands.clear()
|
| 766 |
+
self.execution_history = []
|
| 767 |
+
self.goal_achieved = False
|
| 768 |
+
logger.info(f"Strategic Agent Goal set: {goal}. Starting initial reconnaissance.")
|
| 769 |
+
|
| 770 |
+
|
| 771 |
+
def _generate_strategic_plan(self, goal: str) -> List[Dict]:
|
| 772 |
+
logger.debug(f"Generating strategic plan for goal: {goal}")
|
| 773 |
+
plan = []
|
| 774 |
+
goal_lower = goal.lower()
|
| 775 |
+
|
| 776 |
+
plan.append({"phase": "initial_reconnaissance", "objective": f"Perform initial reconnaissance for {goal}"})
|
| 777 |
+
|
| 778 |
+
if "web" in goal_lower or "http" in goal_lower:
|
| 779 |
+
plan.append({"phase": "web_enumeration", "objective": "Enumerate web server for directories and files"})
|
| 780 |
+
plan.append({"phase": "web_vulnerability_analysis", "objective": "Analyze web vulnerabilities (SQLi, XSS, etc.)"})
|
| 781 |
+
plan.append({"phase": "web_exploitation", "objective": "Attempt to exploit web vulnerabilities"})
|
| 782 |
+
plan.append({"phase": "post_exploitation", "objective": "Perform post exploitation activities"})
|
| 783 |
+
|
| 784 |
+
elif "android" in goal_lower or "mobile" in goal_lower or "adb" in goal_lower:
|
| 785 |
+
plan.append({"phase": "android_enumeration", "objective": "Enumerate Android device via ADB"})
|
| 786 |
+
plan.append({"phase": "android_app_analysis", "objective": "Analyze Android application for vulnerabilities"})
|
| 787 |
+
plan.append({"phase": "android_exploitation", "objective": "Attempt to exploit Android vulnerabilities"})
|
| 788 |
+
plan.append({"phase": "data_extraction", "objective": "Extract sensitive data from device"})
|
| 789 |
+
|
| 790 |
+
else:
|
| 791 |
+
plan.append({"phase": "network_scanning", "objective": "Perform detailed network scanning"})
|
| 792 |
+
plan.append({"phase": "service_enumeration", "objective": "Enumerate services and identify versions"})
|
| 793 |
+
plan.append({"phase": "vulnerability_analysis", "objective": "Analyze services for vulnerabilities"})
|
| 794 |
+
plan.append({"phase": "exploitation", "objective": "Attempt to exploit vulnerabilities"})
|
| 795 |
+
plan.append({"phase": "post_exploitation", "objective": "Perform post exploitation (privilege escalation, data exfiltration)"})
|
| 796 |
+
|
| 797 |
+
plan.append({"phase": "reporting", "objective": "Generate pentest report"})
|
| 798 |
+
|
| 799 |
+
logger.info(f"Generated strategic plan for goal '{goal}': {plan}")
|
| 800 |
+
return plan
|
| 801 |
+
|
| 802 |
+
def evaluate_phase_completion(self) -> float:
|
| 803 |
+
phase_commands = [cmd for cmd in self.execution_history
|
| 804 |
+
if cmd.get('phase', '') == self.current_phase]
|
| 805 |
+
if not phase_commands:
|
| 806 |
+
return 0.0
|
| 807 |
+
successful = sum(1 for cmd in phase_commands if cmd['success'])
|
| 808 |
+
return successful / len(phase_commands)
|
| 809 |
+
|
| 810 |
+
def advance_phase(self):
|
| 811 |
+
if self.current_phase_index < len(self.current_plan) - 1:
|
| 812 |
+
self.current_phase_index += 1
|
| 813 |
+
self.current_phase = self.current_plan[self.current_phase_index]["phase"]
|
| 814 |
+
logger.info(f"Strategic Agent advancing to new phase: {self.current_phase.replace('_', ' ').title()}")
|
| 815 |
+
self.no_progress_count = 0
|
| 816 |
+
self.react_cycle_count = 0
|
| 817 |
+
else:
|
| 818 |
+
self.current_phase = "completed"
|
| 819 |
+
self.goal_achieved = True
|
| 820 |
+
logger.info("Strategic Agent: All planned phases completed. Goal achieved!")
|
| 821 |
+
|
| 822 |
+
def observe_result(self, command: str, output: str, success: bool):
|
| 823 |
+
logger.debug(f"Strategic Agent observing result for command '{command}': Success={success}")
|
| 824 |
+
self.execution_history.append({"command": command, "output": output, "success": success, "timestamp": datetime.now().isoformat()})
|
| 825 |
+
self.gathered_info.append(output)
|
| 826 |
+
|
| 827 |
+
self.analyze_command_output_strategic(command, output)
|
| 828 |
+
|
| 829 |
+
if not success:
|
| 830 |
+
self.no_progress_count += 1
|
| 831 |
+
else:
|
| 832 |
+
self.no_progress_count = 0
|
| 833 |
+
|
| 834 |
+
if success and self.current_phase_index < len(self.current_plan) - 1:
|
| 835 |
+
phase_completion = self.evaluate_phase_completion()
|
| 836 |
+
if phase_completion >= 0.8:
|
| 837 |
+
self.advance_phase()
|
| 838 |
+
|
| 839 |
+
def analyze_command_output_strategic(self, command: str, output: str):
|
| 840 |
+
"""Strategic Agent performs deeper analysis of command output for vulnerabilities."""
|
| 841 |
+
try:
|
| 842 |
+
logger.debug(f"Analyzing strategic command output for: {command}")
|
| 843 |
+
if command.startswith("nmap"):
|
| 844 |
+
if "open" in output and "vulnerable" in output.lower():
|
| 845 |
+
self.ingest_vulnerability(
|
| 846 |
+
"Potential vulnerability found in NMAP scan",
|
| 847 |
+
"Medium",
|
| 848 |
+
"NMAP-SCAN"
|
| 849 |
+
)
|
| 850 |
+
port_matches = re.findall(r'(\d+)/tcp\s+open\s+(\S+)', output)
|
| 851 |
+
for port, service in port_matches:
|
| 852 |
+
self.gathered_info.append(f"Discovered open port {port} with service {service}")
|
| 853 |
+
|
| 854 |
+
elif command.startswith("nikto"):
|
| 855 |
+
if "OSVDB-" in output:
|
| 856 |
+
vuln_matches = re.findall(r'OSVDB-\d+:\s*(.+)', output)
|
| 857 |
+
for vuln in vuln_matches[:3]:
|
| 858 |
+
self.ingest_vulnerability(
|
| 859 |
+
f"Nikto vulnerability: {vuln}",
|
| 860 |
+
"High",
|
| 861 |
+
"NIKTO-SCAN"
|
| 862 |
+
)
|
| 863 |
+
|
| 864 |
+
elif command.startswith("sqlmap"):
|
| 865 |
+
if "injection" in output.lower():
|
| 866 |
+
self.ingest_vulnerability(
|
| 867 |
+
"SQL injection vulnerability detected",
|
| 868 |
+
"Critical",
|
| 869 |
+
"SQLMAP-SCAN"
|
| 870 |
+
)
|
| 871 |
+
|
| 872 |
+
elif command.startswith("adb"):
|
| 873 |
+
if "debuggable" in output.lower():
|
| 874 |
+
self.ingest_vulnerability(
|
| 875 |
+
"Debuggable Android application found",
|
| 876 |
+
"High",
|
| 877 |
+
"ADB-DEBUG"
|
| 878 |
+
)
|
| 879 |
+
if "permission" in output.lower() and "denied" in output.lower():
|
| 880 |
+
self.ingest_vulnerability(
|
| 881 |
+
"Permission issue detected on Android device",
|
| 882 |
+
"Medium",
|
| 883 |
+
"ADB-PERMISSION"
|
| 884 |
+
)
|
| 885 |
+
except Exception as e:
|
| 886 |
+
logger.error(f"Strategic Agent: Error analyzing command output: {e}", exc_info=True)
|
| 887 |
+
|
| 888 |
+
def ingest_vulnerability(self, description: str, severity: str, cve_id: Optional[str] = None, exploit_id: Optional[str] = None):
|
| 889 |
+
vulnerability = {
|
| 890 |
+
"description": description,
|
| 891 |
+
"severity": severity,
|
| 892 |
+
"timestamp": datetime.now().isoformat()
|
| 893 |
+
}
|
| 894 |
+
if cve_id:
|
| 895 |
+
vulnerability["cve_id"] = cve_id
|
| 896 |
+
if exploit_id:
|
| 897 |
+
vulnerability["exploit_id"] = exploit_id
|
| 898 |
+
|
| 899 |
+
self.identified_vulnerabilities.append(vulnerability)
|
| 900 |
+
logger.info(f"Strategic Agent identified vulnerability: {description} (Severity: {severity})")
|
| 901 |
+
|
| 902 |
+
# Instantiate the Strategic Agent Brain
|
| 903 |
+
strategic_brain = StrategicAgentBrain()
|
| 904 |
+
|
| 905 |
+
# --- Request Models for API Endpoints ---
|
| 906 |
+
class RAGRequest(BaseModel):
|
| 907 |
+
query: constr(min_length=3, max_length=500)
|
| 908 |
+
top_k: int = Field(5, gt=0, le=20)
|
| 909 |
+
|
| 910 |
+
class FirebaseQueryRequest(BaseModel):
|
| 911 |
+
goal: str
|
| 912 |
+
phase: str = None
|
| 913 |
+
limit: int = 10
|
| 914 |
+
|
| 915 |
+
class DeepSearchRequest(BaseModel):
|
| 916 |
+
device_info: str
|
| 917 |
+
os_version: str
|
| 918 |
+
|
| 919 |
+
class SetGoalRequest(BaseModel):
|
| 920 |
+
goal: str
|
| 921 |
+
|
| 922 |
+
class GetNextCommandRequest(BaseModel):
|
| 923 |
+
current_state: str
|
| 924 |
+
last_command_output: str
|
| 925 |
+
last_command_success: bool
|
| 926 |
+
execution_history_summary: List[Dict] = []
|
| 927 |
+
gathered_info_summary: List[str] = []
|
| 928 |
+
identified_vulnerabilities_summary: List[Dict] = []
|
| 929 |
+
|
| 930 |
+
class ObserveResultRequest(BaseModel):
|
| 931 |
+
command: str
|
| 932 |
+
output: str
|
| 933 |
+
success: bool
|
| 934 |
+
|
| 935 |
+
class LoadStrategicModelRequest(BaseModel):
|
| 936 |
+
model_url: str # Now expects a URL instead of a local path
|
| 937 |
+
|
| 938 |
+
# --- API Endpoints ---
|
| 939 |
+
@app.get("/health")
|
| 940 |
+
async def health_check():
|
| 941 |
+
"""Endpoint to check the health of the service."""
|
| 942 |
+
logger.debug("Health check requested.")
|
| 943 |
+
return {"status": "ok", "message": "Knowledge service is running."}
|
| 944 |
+
|
| 945 |
+
@app.post("/rag/retrieve")
|
| 946 |
+
async def rag_retrieve_endpoint(request: RAGRequest):
|
| 947 |
+
logger.debug(f"RAG retrieve endpoint called with query: {request.query}")
|
| 948 |
+
try:
|
| 949 |
+
results = rag_index.retrieve(request.query, request.top_k)
|
| 950 |
+
return {"success": True, "data": {"results": results}, "error": None}
|
| 951 |
+
except Exception as e:
|
| 952 |
+
logger.error(f"RAG retrieval failed: {e}", exc_info=True)
|
| 953 |
+
raise HTTPException(status_code=500, detail=str(e))
|
| 954 |
+
|
| 955 |
+
@app.post("/firebase/query")
|
| 956 |
+
async def firebase_query_endpoint(request: FirebaseQueryRequest):
|
| 957 |
+
logger.debug(f"Firebase query endpoint called with goal: {request.goal}, phase: {request.phase}")
|
| 958 |
+
try:
|
| 959 |
+
results = firebase_kb.query(request.goal, request.phase, request.limit)
|
| 960 |
+
return {"success": True, "data": {"results": results}, "error": None}
|
| 961 |
+
except Exception as e:
|
| 962 |
+
logger.error(f"Firebase query failed: {e}", exc_info=True)
|
| 963 |
+
raise HTTPException(status_code=500, detail=str(e))
|
| 964 |
+
|
| 965 |
+
@app.post("/deep_search")
|
| 966 |
+
async def deep_search_endpoint(request: DeepSearchRequest):
|
| 967 |
+
logger.debug(f"Deep search endpoint called for device: {request.device_info}, OS: {request.os_version}")
|
| 968 |
+
try:
|
| 969 |
+
results = deep_search_engine.search_device_info(request.device_info, request.os_version)
|
| 970 |
+
results["public_resources"] = deep_search_engine.search_public_resources(request.device_info)
|
| 971 |
+
return {"success": True, "data": results, "error": None}
|
| 972 |
+
except Exception as e:
|
| 973 |
+
logger.error(f"Deep search failed: {e}", exc_info=True)
|
| 974 |
+
raise HTTPException(status_code=500, detail=str(e))
|
| 975 |
+
|
| 976 |
+
@app.post("/strategic_agent/load_model")
|
| 977 |
+
async def load_strategic_model(request: LoadStrategicModelRequest):
|
| 978 |
+
logger.info(f"Request to load strategic model: {request.model_url}")
|
| 979 |
+
success, message = await strategic_brain.load_strategic_llm(request.model_url)
|
| 980 |
+
if success:
|
| 981 |
+
logger.info(f"Strategic model loaded successfully: {message}")
|
| 982 |
+
return {"status": "success", "message": message, "model": strategic_brain.loaded_model_name}
|
| 983 |
+
else:
|
| 984 |
+
logger.error(f"Failed to load strategic model: {message}")
|
| 985 |
+
raise HTTPException(status_code=500, detail=message)
|
| 986 |
+
|
| 987 |
+
@app.post("/strategic_agent/unload_model")
|
| 988 |
+
async def unload_strategic_model():
|
| 989 |
+
logger.info("Request to unload strategic model.")
|
| 990 |
+
await strategic_brain.unload_strategic_llm()
|
| 991 |
+
return {"status": "success", "message": "Strategic LLM unloaded."}
|
| 992 |
+
|
| 993 |
+
@app.post("/strategic_agent/set_goal")
|
| 994 |
+
async def strategic_set_goal(request: SetGoalRequest):
|
| 995 |
+
logger.info(f"Strategic Agent received new goal: {request.goal}")
|
| 996 |
+
# Call the synchronous set_goal method
|
| 997 |
+
strategic_brain.set_goal(request.goal)
|
| 998 |
+
return {"status": "success", "message": f"Goal set to: {request.goal}"}
|
| 999 |
+
|
| 1000 |
+
@app.post("/strategic_agent/get_next_command")
|
| 1001 |
+
async def strategic_get_next_command(request: GetNextCommandRequest):
|
| 1002 |
+
logger.debug("Strategic Agent received request for next command.")
|
| 1003 |
+
# Update strategic brain's state with latest from execution agent
|
| 1004 |
+
strategic_brain.execution_history = request.execution_history_summary
|
| 1005 |
+
strategic_brain.gathered_info = request.gathered_info_summary
|
| 1006 |
+
strategic_brain.identified_vulnerabilities = request.identified_vulnerabilities_summary
|
| 1007 |
+
|
| 1008 |
+
# Simulate agent's thinking process
|
| 1009 |
+
command = strategic_brain.parse_llm_response(
|
| 1010 |
+
strategic_brain._get_llm_response(
|
| 1011 |
+
strategic_brain._generate_llm_prompt() # Generate prompt based on updated state
|
| 1012 |
+
)
|
| 1013 |
+
)
|
| 1014 |
+
|
| 1015 |
+
if command:
|
| 1016 |
+
strategic_brain.used_commands.add(command) # Ensure strategic agent tracks used commands
|
| 1017 |
+
logger.info(f"Strategic Agent generated command: {command}")
|
| 1018 |
+
return {"command": command, "status": "success"}
|
| 1019 |
+
else:
|
| 1020 |
+
# Fallback if strategic agent fails to generate a valid command
|
| 1021 |
+
target_ip_match = re.search(r'\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b', strategic_brain.current_goal or "")
|
| 1022 |
+
fallback_ip = target_ip_match.group(0) if target_ip_match else "192.168.1.1"
|
| 1023 |
+
logger.warning(f"Strategic Agent failed to generate command. Returning fallback: {fallback_ip}")
|
| 1024 |
+
# If no LLM is loaded, provide a more informative fallback
|
| 1025 |
+
if strategic_brain.llm is None:
|
| 1026 |
+
return {"command": f"echo 'No LLM loaded. Please load a model from settings. Fallback: nmap -sV -Pn {fallback_ip}'", "status": "fallback", "message": "No LLM loaded on Strategic Agent. Please load one from the frontend settings."}
|
| 1027 |
+
else:
|
| 1028 |
+
return {"command": f"nmap -sV -Pn {fallback_ip}", "status": "fallback", "message": "Strategic Agent could not determine a valid next command."}
|
| 1029 |
+
|
| 1030 |
+
|
| 1031 |
+
@app.post("/strategic_agent/observe_result")
|
| 1032 |
+
async def strategic_observe_result(request: ObserveResultRequest):
|
| 1033 |
+
logger.debug(f"Strategic Agent received observation for command: {request.command}, success: {request.success}")
|
| 1034 |
+
strategic_brain.observe_result(request.command, request.output, request.success)
|
| 1035 |
+
return {"status": "success", "message": "Observation received and processed."}
|
| 1036 |
+
|
| 1037 |
+
@app.get("/strategic_agent/get_status")
|
| 1038 |
+
async def strategic_get_status():
|
| 1039 |
+
logger.debug("Strategic Agent status requested.")
|
| 1040 |
+
return {
|
| 1041 |
+
"currentGoal": strategic_brain.current_goal,
|
| 1042 |
+
"currentPhase": strategic_brain.current_phase.replace('_', ' ').title(),
|
| 1043 |
+
"reactCycleCount": strategic_brain.react_cycle_count,
|
| 1044 |
+
"noProgressCount": strategic_brain.no_progress_count,
|
| 1045 |
+
"identifiedVulnerabilities": [v['description'] for v in strategic_brain.identified_vulnerabilities],
|
| 1046 |
+
"gatheredInfo": [info[:100] + "..." for info in strategic_brain.gathered_info[-5:]] if strategic_brain.gathered_info else [],
|
| 1047 |
+
"executionHistorySummary": [{
|
| 1048 |
+
"command": e['command'],
|
| 1049 |
+
"success": e['success'],
|
| 1050 |
+
"timestamp": e['timestamp']
|
| 1051 |
+
} for e in strategic_brain.execution_history[-10:]],
|
| 1052 |
+
"strategicPlan": strategic_brain.current_plan,
|
| 1053 |
+
"currentPhaseIndex": strategic_brain.current_phase_index,
|
| 1054 |
+
"goalAchieved": strategic_brain.goal_achieved,
|
| 1055 |
+
"strategicAgentStatus": "Running" if strategic_brain.current_goal and not strategic_brain.goal_achieved else "Idle",
|
| 1056 |
+
"loadedModel": strategic_brain.loaded_model_name # Return the name of the loaded model
|
| 1057 |
+
}
|
| 1058 |
+
|
| 1059 |
+
@app.get("/api/models")
|
| 1060 |
+
async def get_available_models_strategic():
|
| 1061 |
+
"""List predefined Hugging Face models for strategic agent."""
|
| 1062 |
+
logger.debug("Request for available strategic models received.")
|
| 1063 |
+
# Explicitly return JSONResponse to ensure correct content type
|
| 1064 |
+
return JSONResponse(content=json.dumps(HUGGINGFACE_MODELS), media_type="application/json")
|
| 1065 |
+
|
| 1066 |
+
# --- Startup Event to Download All Models and Start ngrok Tunnel (Modified for HF Spaces) ---
|
| 1067 |
+
@app.on_event("startup")
|
| 1068 |
+
async def startup_event_download_models(): # Renamed function
|
| 1069 |
+
logger.info("Application startup event triggered. Attempting to download all predefined models.")
|
| 1070 |
+
|
| 1071 |
+
# Download all models
|
| 1072 |
+
for model_info in HUGGINGFACE_MODELS:
|
| 1073 |
+
model_url = model_info["url"]
|
| 1074 |
+
model_name = model_info["name"]
|
| 1075 |
+
model_filename = model_url.split('/')[-1]
|
| 1076 |
+
local_model_path = os.path.join(DOWNLOAD_DIR, model_filename)
|
| 1077 |
+
|
| 1078 |
+
if not os.path.exists(local_model_path):
|
| 1079 |
+
logger.info(f"Downloading model '{model_name}' from {model_url} to {local_model_path}...")
|
| 1080 |
+
try:
|
| 1081 |
+
response = requests.get(model_url, stream=True)
|
| 1082 |
+
response.raise_for_status()
|
| 1083 |
+
with open(local_model_path, 'wb') as f:
|
| 1084 |
+
for chunk in response.iter_content(chunk_size=8192):
|
| 1085 |
+
f.write(chunk)
|
| 1086 |
+
logger.info(f"Model '{model_name}' downloaded successfully.")
|
| 1087 |
+
except Exception as e:
|
| 1088 |
+
logger.error(f"Failed to download model '{model_name}': {e}", exc_info=True)
|
| 1089 |
+
else:
|
| 1090 |
+
logger.info(f"Model '{model_name}' already exists at {local_model_path}. Skipping download.")
|
| 1091 |
+
logger.info("Finished attempting to download all predefined models.")
|
| 1092 |
+
|
| 1093 |
+
# --- Shutdown Event (ngrok related parts removed) ---
|
| 1094 |
+
@app.on_event("shutdown")
|
| 1095 |
+
async def shutdown_event_cleanup(): # Renamed function
|
| 1096 |
+
logger.info("Application shutdown event triggered. Performing cleanup.")
|
| 1097 |
+
# No ngrok.kill() needed here as ngrok is not used
|
| 1098 |
+
|
| 1099 |
+
if __name__ == "__main__":
|
| 1100 |
+
import uvicorn
|
| 1101 |
+
logger.info("Starting FastAPI application on Hugging Face Spaces (port 7860)...")
|
| 1102 |
+
uvicorn.run(
|
| 1103 |
+
app,
|
| 1104 |
+
host="0.0.0.0",
|
| 1105 |
+
port=7860, # Standard port for Hugging Face Spaces
|
| 1106 |
+
log_level="info" # Changed to info for less verbose default output
|
| 1107 |
+
)
|