han-nguyen-cyber/Robort-Custom-Web-Vulnerability-Scanner-with-AI-Reporting

GitHub: han-nguyen-cyber/Robort-Custom-Web-Vulnerability-Scanner-with-AI-Reporting

一个集成 AI 报告功能的定制化 Web 漏洞扫描器,旨在提升漏洞检测透明度并降低安全评估门槛。

Stars: 1 | Forks: 0

# IT\_359\_Final\_Project\_Group_8 # Robort :3 – Custom Web Vulnerability Scanner with AI Reporting image **Notes:** - This was a custom web application vulnerability scanner, with an AI integration element of AI reporting, made as a project for IT 359. - This readme outlines: 1. The Project Overview 2. The Tool's List of Features 3. Instructions on How to Set Up and Run the Tool **Roles:** - **Technical Lead:** Han Nguyen - **Presentation lead:** Carter Steiling - **Documentation Lead:** Michael Mui ## i. 项目概述: Robort is a custom-built web application vulnerability scanner with an AI integration, designed to identify common security issues in web applications, including SQL injection, cross-site scripting (XSS), and security misconfigurations. This tool is built to provide transparency on how automated scanners work, allowing users to understand detection logic, rather than relying on "black box" tools. Robort combines automated scanning techniques with AI-powered reporting to generate detailed security assessments, which include risk analysis, remediation recommendations, and mapping to the MITRE ATT&CK framework. This project also includes a containerized testing environment using Docker, allowing users to scan intentionally vulnerable targets such as Damn Vulnerable Web Application (DVWA), and a vulnerable vibe-coded web application. ## ii. 功能列表: 1. **Automated Vulnerability Scanning**\ a. Detects SQL Injection (SQLi) b. Detects Cross-Site Scripting (XSS) c. Identifies missing security headers (CSP, HSTS, X-Frame-Options) 2. **Form & Parameter Testing**\ a. Injects payloads into URL parameters and HTML forms b. Analyzes server responses for indicators of vulnerabilities 3. **DVWA Mode**\ a. Specialized scanning for Damn Vulnerable Web Application (DVWA), to mimic an organization's need for custom detection logic based on unique attack surface pertaining to their information environment. b. Consistently identifies vulnerabilities. 4. **AI-Powered Reporting (AI Integration)**\ a. Generates structured security reports, including: 1. Risk analysis 2. Remediation strategies 3. MITRE ATT&CK framework mappings 5. **Professional Output Formatting**\ a. Color-coded severity levels (High, Medium, Low) \ b. Table-based vulnerability display \ c. Summary Statistics \ 6. **Dockerized Lab Environment**\ a. Scanner runs in its own container b. The available targets include: 1. Damn Vulnerable Web Application (DVWA) 2. Vibe-Coded Vulnerable Web Application 7. **JSON Export**\ 1. Scan results can be saved for later analysis or AI processing. ## iii. 使用说明:如何设置和运行该工具: 1. **Prerequisites:**\ a. **Remove Old Versions of Docker:** `for pkg in docker.io docker-doc docker-compose podman-docker containerd runc; do sudo apt-get remove $pkg; done` b. **Install Docker and Docker Compose (on Debian-based system)** sudo apt-get update sudo apt-get install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin 2. **Project Setup:**\ a. **Download this project's code.** b. **Navigate to the project directory:** `cd ~/Downloads/robort` c. **Ensure the folder structure looks like this:** ``` robort/ |--- docker-compose.yml |--- .env |--- robort/ |--- vulnapp/ ``` 3. **Start the Environment:**\ a. Build and launch all the services using the following command: ` docker-compose up --build ` This command will start the Robort scanner container, DVWA on port 8081, and the vulnerable vibe-coded app on port 5000. 4. **Access Targets:**\ a. **Access DVWA:**\ - Link: http://localhost:8081 \ - Username: admin \ - Password: password \ - The security level should be set to LOW. \ b. **Access the Vibe-Coded Vulnerable App:** \ - Link: http://localhost:5000 5. **Run the Scanner:**\ a. Open a new terminal, and access the scanner container: ` docker exec -it robort bash ` b. Scan DVWA: ` python main.py --target http://dvwa/ --dvwa --json ` c. Scan Vibe-Coded Web App: ` python main.py --target http://vulnapp:5000 --json ` d. To generate an AI Report: - An API key must be configured by creating an .env file, and defining "MY_API_KEY=xxxxxxx", where you must provide your own API key for the http://sushi.it.ilstu.edu:8080/ server. ` python main.py --target http://dvwa/ --dvwa ` With the above command, the tool will automatically generate a detailed AI-based vulnerability report.
标签:AI报告, CISA项目, Cloudflare, CSP, Docker, Docker部署, DOE合作, DVWA, HSTS, HTTP安全头, MITRE ATT&CK, Web安全, X-Frame-Options, XSS, 参数测试, 安全标准, 安全测试, 安全配置, 安全防御评估, 定制扫描器, 容器化测试, 攻击性安全, 漏洞情报, 网络安全审计, 蓝队分析, 表单注入, 请求拦截, 逆向工具