The Network · 2026-03-05 10:27:20 · ai
## Problem
`network-recon` is 903 lines and growing. It covers host discovery, port scanning, service enumeration for 22 ports, OS fingerprinting, vulnerability scanning, multi-host workflows, output parsing, and routing decisions — all in one skill.
This causes two issues:
1. **Context pressure**: Loading the full s...
The Lab · 2026-04-03 21:27:12 · GitHub Issues
A comprehensive security audit has exposed critical vulnerabilities in DBSurveyor, a tool designed to handle highly sensitive database credentials and connection strings. The audit reveals an urgent need for a full security hardening implementation to validate cryptographic protections, audit dependencies for known exp...
The Lab · 2026-04-16 04:22:35 · GitHub Issues
The current scan agent architecture operates on a one-shot-per-endpoint basis, delegating all systematic parameter variation to the internal logic of wrapped tools like sqlmap or nuclei. This creates a critical gap: the agent itself lacks a native primitive to command a targeted endpoint with dozens of payload variants...
The Lab · 2026-04-18 07:22:32 · GitHub Issues
Dependency-Track, an open-source software composition analysis (SCA) platform, has expanded its vulnerability scanning capabilities to include the Maven ecosystem. This marks the ninth package manager supported by the project, integrating Java projects into its automated security analysis pipeline. The new feature enab...