Writing workflows
... or how to integrate new workflows with secator.
New secator workflows should be easy to write to promote contributions from the community.
Eventually we aim for our workflow library to become a reference in cyber-security much like Nuclei templates have become a reference for vulnerability searching.
Basic YAML definition
secator workflows are defined through YAML configs:
type: workflow
name: url_finder
alias: ufind
description: URL finder and tagger
tags: [http]
input_types:
- url
tasks:
katana:
description: Find URLs
rate_limit: 100
timeout: 1
gf:
description: Tag URLs
pattern: xssDynamic targets
You can specify dynamic targets for tasks from current run results, by using the targets_ key in your template like:
Concurrent tasks
You can specify tasks that run in parallel using the _group key:
In this configuration, the katanatask will begin the run, followed by a grouped execution of gf and another_task.
Result filtering
You can customize which results you want to keep for workflows and scans by adding the results key to the respective runner YAML configuration:
Last updated
Was this helpful?