We take the security of WAF Payload Arsenal seriously. If you discover a security vulnerability, please follow responsible disclosure practices.
Please DO NOT open a public GitHub issue for security vulnerabilities.
Instead, report security issues privately:
- Email: security@dalisecurity.com
- Subject:
[SECURITY] WAF Payload Arsenal - [Brief Description] - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Status Updates: Every 7-14 days
- Resolution Timeline: 90 days for responsible disclosure
- 90-day disclosure timeline from initial report
- Credit: We will credit researchers in release notes (unless you prefer to remain anonymous)
- CVE Assignment: We will work with you to assign CVEs when applicable
- Public Disclosure: After fix is released or 90 days, whichever comes first
This repository contains security testing payloads for educational and authorized testing only.
Vulnerabilities we're interested in:
- Issues in the CLI tool (
waf_tester.py) - JSON parsing vulnerabilities
- Path traversal in payload loading
- Code injection in testing scripts
- Docker container security issues
- Documentation that could lead to misuse
Not security issues:
- Payloads that successfully bypass WAFs (that's the point!)
- False positives in payload detection
- WAF vendors blocking our payloads
- Theoretical attacks without proof of concept
This repository is for AUTHORIZED TESTING ONLY:
-
β Do: Test systems you own or have written permission to test
-
β Do: Follow bug bounty program rules and scope
-
β Do: Practice responsible disclosure
-
β Do: Use for educational and research purposes
-
β Don't: Test systems without authorization
-
β Don't: Use for malicious purposes
-
β Don't: Violate laws or regulations
-
β Don't: Ignore bug bounty program rules
By using this repository, you agree to:
- Only test authorized systems
- Follow all applicable laws
- Practice responsible disclosure
- Not use for malicious purposes
- Respect intellectual property rights
- Verify Payloads: Always review payloads before testing
- Isolated Environment: Test in isolated/sandboxed environments
- Authorization: Get written permission before testing
- Data Protection: Don't include sensitive data in reports
- Update Regularly: Pull latest security fixes
- Code Review: All contributions are reviewed
- No Malicious Code: Contributions must not contain malware
- Safe Payloads: Payloads should be safe for testing (no destructive actions)
- Documentation: Document any security implications
- Dependencies: Minimize external dependencies
Before using this tool:
- I have authorization to test the target system
- I understand the legal implications
- I have reviewed the payloads I'm using
- I'm testing in an appropriate environment
- I will follow responsible disclosure practices
- I will not use this for malicious purposes
We recognize and thank security researchers who help improve this project:
No vulnerabilities reported yet. Be the first!
- Security Issues: security@dalisecurity.com
- General Questions: GitHub Issues
- Commercial Inquiries: contact@dalisecurity.com
Last Updated: February 28, 2026
Version: 1.0.0