openrisk is an experimental tool which reads nuclei output (text and markdown) and generates a risk score for the host using OpenAI's GPT-3 model. It is intended, for now, to work against a single target at a time.
NOTE: This is an experimental program released by the ProjectDiscovery Research Team. As such, it may not meet the same code quality standards as our other projects, and may not be as well-tested. We welcome suggestions, bug fixes, and ideas on integrating these experiments into our other tools!
Install openrisk
openrisk requires go1.18 to install successfully. Run the following command to install the latest version -
Usage
_ __ ____ ____ ___ ____ _____(_)____/ /__ / __ \/ __ \/ _ \/ __ \/ ___/ / ___/ //_/ / /_/ / /_/ / __/ / / / / / (__ ) ,< \____/ .___/\___/_/ /_/_/ /_/____/_/|_| Powered by OpenAI (GPT-3) /_/ v0.0.1 (experimental) projectdiscovery.io -i string Nuclei scan result file or directory path. Supported file extensions: .txt, .md
NOTE:
OPENAI_API_KEY
is required to run this program and can be obtained by signing up athttps://openai.com/api/
Generating Risk Score
export OPENAI_API_KEY=<OPENAI_API_KEY> openrisk -i nuclei_scan_result.txt
Example Run:
openrisk -i nuclei_results.txt _ __ ____ ____ ___ ____ _____(_)____/ /__ / __ \/ __ \/ _ \/ __ \/ ___/ / ___/ //_/ / /_/ / /_/ / __/ / / / / / (__ ) ,< \____/ .___/\___/_/ /_/_/ /_/____/_/|_| Powered by OpenAI (GPT-3) /_/ v0.0.1 (experimental) projectdiscovery.io [RISK SCORE] The 10-scale risk score for the Nuclei scan results is 10. There are multiple high-severity vulnerabilities related to Pantheon, AWS, and Netlify takeovers.