Skip to content

Add 4 novel attack categories (40 payloads)#53

Merged
thebenignhacker merged 4 commits intomainfrom
feat/novel-attack-modules
Mar 17, 2026
Merged

Add 4 novel attack categories (40 payloads)#53
thebenignhacker merged 4 commits intomainfrom
feat/novel-attack-modules

Conversation

@thebenignhacker
Copy link
Copy Markdown
Contributor

Summary

  • Add memory-weaponization, context-window, supply-chain, and tool-shadow attack categories
  • 40 new payloads (10 per category: 2 passive, 5 active, 3 aggressive)
  • Total payload count: 75 -> 115
  • Updated types, scanner, CLI help text, subpath exports
  • Version bump: 0.10.2 -> 0.11.0

Test plan

  • 40 new payload tests (unique IDs, correct categories, intensity distribution)
  • 920 total tests passing
  • E2E: hackmyagent attack --category memory-weaponization works
  • E2E: multi-category mode works
  • Build clean

…ply chain, tool shadow

- memory-weaponization (MEM-001 to MEM-010): memory poisoning, persistence, credential extraction
- context-window (CTX-001 to CTX-010): attention displacement, priority hijacking, context overflow
- supply-chain (SUP-001 to SUP-010): typosquatting, dependency confusion, registry redirect
- tool-shadow (SHADOW-001 to SHADOW-010): tool interception, shadow registration, parameter injection

Each module has 10 payloads (2 passive, 5 active, 3 aggressive) with OASB control mappings.
Updates AttackCategory type, ATTACK_CATEGORIES metadata, scanner byCategory, CLI abbreviations.
Adds subpath exports: ./memory, ./context-window, ./supply-chain, ./shadow.
Bumps version to 0.11.0. 40 new tests (10 per module), all passing.
Reflects 4 new attack categories (memory-weaponization, context-window,
supply-chain, tool-shadow) adding 40 payloads.
@thebenignhacker thebenignhacker merged commit 7a3e24f into main Mar 17, 2026
@thebenignhacker thebenignhacker deleted the feat/novel-attack-modules branch March 17, 2026 19:20
Copy link
Copy Markdown

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Claude Code Review

VERDICT: APPROVE

SUMMARY: This PR adds 40 new attack payloads across 4 novel attack categories (memory-weaponization, context-window, supply-chain, tool-shadow) to the HackMyAgent security scanner. All payloads are static string literals used for testing AI agent security postures — they contain no executable code, perform no network operations, and introduce no security vulnerabilities. The changes are purely additive (new payload files, test files, type exports, and package.json metadata updates). All 920 tests pass, including comprehensive validation of payload structure, ID conventions, and intensity distributions. The payloads themselves are designed to test agent vulnerabilities but do not execute any of the described attack behaviors within HackMyAgent's codebase.

No security, correctness, or quality issues found. The PR is well-structured, thoroughly tested, and aligns with the project's security testing mission.


Reviewed 14 files changed (51393 bytes)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant