Skip to content

Commit 085f13e

Browse files
Merge pull request #4 from kevinbackhouse/ghsa_variant_analysis_demo
Make the demo quicker to run by only analyzing one GHSA
2 parents a08770e + 9d07cc2 commit 085f13e

File tree

1 file changed

+32
-23
lines changed

1 file changed

+32
-23
lines changed

src/seclab_taskflows/taskflows/audit/ghsa_variant_analysis_demo.yaml

Lines changed: 32 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ seclab-taskflow-agent:
1010
filetype: taskflow
1111
version: 1
1212

13-
model_config: seclab_taskflows.configs.model_config_lowercost
13+
model_config: seclab_taskflows.configs.model_config
1414

1515
globals:
1616
repo:
@@ -20,41 +20,50 @@ taskflow:
2020
must_complete: true
2121
agents:
2222
- seclab_taskflow_agent.personalities.assistant
23-
user_prompt: |
24-
Fetch the GHSAs of the repo {{ GLOBALS_repo }}.
2523
toolboxes:
26-
- seclab_taskflows.toolboxes.ghsa
24+
- seclab_taskflow_agent.toolboxes.memcache
25+
user_prompt: |
26+
Clear the memory cache.
27+
2728
- task:
2829
must_complete: true
29-
repeat_prompt: true
3030
agents:
3131
- seclab_taskflow_agent.personalities.assistant
32-
user_prompt: |
33-
Get the details of the GHSA with ID {{ RESULT_ghsa_id }} in repo {{ GLOBALS_repo }}.
34-
Analyze the description to understand what type of bug caused
35-
the vulnerability.
36-
Try to determine from the description the name of the source code file
37-
that the bug was in.
38-
Store an entry in the memcache with {{ GLOBALS_repo }}_{{ RESULT_ghsa_id }} as the key.
39-
The entry should state the vulnerability type (for example "out-of-bounds array write")
40-
and the name of the source file with the bug.
4132
toolboxes:
4233
- seclab_taskflows.toolboxes.ghsa
43-
- seclab_taskflow_agent.toolboxes.memcache
4434
- seclab_taskflows.toolboxes.gh_file_viewer
35+
- seclab_taskflow_agent.toolboxes.memcache
36+
user_prompt: |
37+
Fetch the details of the most recent GHSA of the repo {{ GLOBALS_repo }}.
38+
39+
Analyze the description to understand what type of bug caused
40+
the vulnerability.
41+
42+
Try to determine from the description the
43+
name of the source code file that the bug was in.
44+
45+
The GHSA may not specify the full path name of the source
46+
file, or it may mention the name of a function or method
47+
instead, so if you have difficulty finding the file, try
48+
searching for the most likely match.
49+
50+
Store a summary of your findings in the memcache with the GHSA
51+
ID as the key.
4552
4653
- task:
4754
must_complete: true
4855
agents:
4956
- seclab_taskflow_agent.personalities.assistant
50-
user_prompt: |
51-
Get all the entries from the memory cache.
52-
Use the list to identify the source file that has been
53-
responsible for the most vulnerabilities in the repo {{ GLOBALS_repo }},
54-
and also the type of bug that was most frequently the cause.
55-
Fetch the source file from GitHub and look for bugs in the code, focusing
56-
particularly on the type of bug that was identified as the most common
57-
cause of vulnerabilities in this repo.
5857
toolboxes:
5958
- seclab_taskflows.toolboxes.gh_file_viewer
6059
- seclab_taskflow_agent.toolboxes.memcache
60+
user_prompt: |
61+
Fetch the GHSA ID and summary that were stored in the memcache
62+
by the previous task.
63+
64+
Fetch the source file that was identified as the cause of the
65+
GHSA in repo {{ GLOBALS_repo }}.
66+
67+
Do a security audit of the code in the source file, focusing
68+
particularly on the type of bug that was identified as the
69+
cause of the GHSA.

0 commit comments

Comments
 (0)