AI prompts
base on Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets! # Misconfig Mapper
Misconfig Mapper is a project by Intigriti for the community to help you find, detect and resolve common security misconfigurations in various popular services, technologies and SaaS-based solutions that your targets use!

# CLI Tool
**Misconfig Mapper** has a [dedicated open-source CLI tool](https://github.com/intigriti/misconfig-mapper) written in Golang to help you automate the testing of most misconfigurations found on covered services.\
\
It can identify and enumerate instances of services used by your company, and perform detection and misconfiguration checks at scale! By supplying a template with detection fingerprints and misconfiguration check fingerprints, the tool can quickly and accurately identify potential security risks in popular third-party software and services!\
\
The tool is based on templates and is versatile. New services can be easily added by adding them to the `services.json` file.
# Features
- The CLI tool is based on templates defined in the `services.json` file. You can add as many as you want. See [_Templates section_](cli-tool.md#templates) for more information on how to add a template.
- If you provide a company name, the tool will automatically generate permutations based on the keyword you provided and try to find any matching services.
- You can also optionally select to only detect the presence of services without performing any misconfiguration checks (see more on [_Usage section_](cli-tool.md#usage)).
# Installation instructions
You can install Misconfig Mapper using Go (version >=1.24 recommended):
```sh
$ go install github.com/intigriti/misconfig-mapper/cmd/misconfig-mapper@latest
```
After installation, the misconfig-mapper command will be available in your PATH if your Go bin directory is properly configured.
## Latest release
To install Misconfig Mapper, you can clone the repository and compile the code from source or [download the latest release](https://github.com/intigriti/misconfig-mapper/releases).
> [!IMPORTANT]
> If you decide to download a release, make sure to run the following command to install the required templates:
> ```
> ./misconfig-mapper -update-templates
> ```
> This command will ensure that you download the latest templates that misconfig-mapper requires.
## From source
If you want to build your own instance from source, ensure you have the latest version of Golang installed. To verify your installation, run:
```bash
$ go version
go version go1.24.0 linux/amd64
```
1. Clone this repository:
```bash
$ git clone https://github.com/intigriti/misconfig-mapper.git
```
2. Next, compile your binary from source:
```bash
$ go build -o misconfig-mapper ./cmd/misconfig-mapper
```
3. Finally, add or move the binary to a folder in your `$PATH` (optional)
## CLI Auto-Completion
In case you would like to enable autocompletions for Misconfig Mapper, we support both Bash and ZSH.
### Bash
```bash
#!/bin/bash
_misconfig_mapper_autocomplete()
{
local cur prev opts
COMPREPLY=()
cur="${COMP_WORDS[COMP_CWORD]}"
prev="${COMP_WORDS[COMP_CWORD-1]}"
opts="-as-domain string -delay -headers -list-services -list-templates -max-redirects -skip-ssl -output-json -permutations -service -skip-misconfiguration-checks -target -templates -timeout -update-templates -verbose"
if [[ ${cur} == -* ]] ; then
COMPREPLY=( $(compgen -W "${opts}" -- ${cur}) )
return 0
fi
}
complete -F _misconfig_mapper_autocomplete misconfig-mapper
```
### ZSH (OhMyZsh)
```zsh
#!/bin/zsh
#compdef misconfig-mapper
_auto_completion_misconfig_mapper() {
local -a options=("-as-domain" "string" "-delay" "-headers" "-list-services" "-list-templates" "-max-redirects" "-skip-ssl" "-output-json" "-permutations" "-service" "-skip-misconfiguration-checks" "-target" "-templates" "-timeout" "-update-templates" "-verbose")
_arguments \
'*: :->args' \
"*: :(${(j:|:)options})"
case $state in
(args)
# Handle arguments completion here
;;
(*)
# Handle options completion here
compadd -a options
;;
esac
}
_auto_completion_misconfig_mapper "$@"
```
> [!IMPORTANT]
> Make sure to save this file as `_auto_completion_misconfig_mapper` under your `$fpath`.
> Afterwards, you will have to initialize the completion system with:
> ```
> autoload -U compinit
> compinit
> ```
# Usage examples
**Example 1:** Perform a scan to enumerate all misconfigured third-party services
```basic
$ ./misconfig-mapper -target "yourcompanyname" -service "*" -delay 1000
```

**Example 2:** Perform a detection-only scan to enumerate all third-party services (without checking for any misconfigurations)
```bash
$ ./misconfig-mapper -target "yourcompanyname" -service "*" -skip-misconfiguration-checks true
```

**Example 3:** Only test for one specific service (by ID or name)
```bash
$ ./misconfig-mapper -target "yourcompanyname" -service 1
```
```bash
$ ./misconfig-mapper -target "yourcompanyname" -service "drupal"
```

**Example 4:** Print out all loaded services
```bash
$ ./misconfig-mapper -list-services
```

Additionally, you can pass request headers using the `-headers` flag to comply with any request requirements (separate each header using a **double semi-colon**):
```
-headers "User-Agent: xyz;; Cookie: session=eyJ...;;"
```
```
Usage of ./misconfig-mapper:
-as-domain string
Treat the target as if its a domain. This flag cannot be used with -permutations. (default "false")
-delay int
Specify a delay between each request sent in milliseconds to enforce a rate limit.
-headers string
Specify request headers to send with requests (separate each header with a double semi-colon: "User-Agent: xyz;; Cookie: xyz...;;")
-list-services
Print all services with their associated IDs
-list-templates
Print all services with their associated IDs (alias for -list-services)
-max-redirects int
Specify the max amount of redirects to follow. (default 5)
-output-json
Format output in JSON
-permutations string
Enable permutations and look for several other keywords of your target. This flag cannot be used with -as-domain. (default "true")
-service string
Specify the service ID you'd like to check for. For example, "0" for Atlassian Jira Open Signups. Use comma seperated values for multiple (i.e. "0,1" for two services). Use "*" to check for all services. (default "0")
-skip-misconfiguration-checks string
Only check for existing instances (and skip checks for potential security misconfigurations). (default "false")
-skip-ssl
Skip SSL/TLS verification (exercise caution!)
-target string
Specify your target company/organization name: "intigriti" (files are also accepted). If the target is a domain, add -as-domain
-templates string
Specify the templates folder location (default "./templates")
-timeout int
Specify a timeout for each request sent in milliseconds. (default 7000)
-update-templates
Pull the latest templates & update your current services.json file
-verbose int
Set output verbosity level. Levels: 0 (=silent, only display vulnerabilities), 1 (=default, suppress non-vulnerable results), 2 (=verbose, log all messages) (default 2)
```
# Templates
You can easily define more templates to scan for. Templates are in a structured JSON object and read from `services.json`\
\
To define more services, edit the services.json file and separate each misconfiguration in your `services.json` file.
An example template definition schema is available [here](.github/assets/template-schema.json).
> [!TIP]
> To update the service.json file to the latest version, simply run:
> ```
> ./misconfig-mapper -update-templates
> ```
> This command will pull the latest templates from Github.
## Template Type Definitions
### **ID**
**Type:** number\
\
The `id` field is used to identify the service when the `-service` flag is provided. It should be a numerical value that follows the sequence of previous IDs.
## Request
### **Method**
**Type:** string
The `method` field is used to provide a HTTP method.
### **BaseURL**
**Type:** string
The `baseURL` field is used to locate the third-party service, if it exists.
> [!TIP]
> The CLI tool can auto-detect and replace the **"{TARGET}"** template variable with the target provided using the target flag.\
> \
> Example: https://{TARGET}.example.com will allow the tool to look for:
>
> - https://yourcompanyname.example.com
> - https://yourcompanyname-app.example.com
> - https://yourcompanyname-eu.example.com
> - ...
### **Path**
**Type:** string
The `path` field checks whether the service is vulnerable by observing the response.
> [!TIP]
> The CLI tool can auto-detect and replace the **"{TARGET}"** template variable with the target provided using the target flag.\
> \
> Example: /app/{TARGET} will allow the tool to look for:
>
> - https://example.com/app/yourcompanyname
> - https://example.com/app/yourcompanyname-app
> - https://example.com/app/yourcompanyname-eu
> - ...
### **Headers**
**Type:** object array
The `headers` field is used to supply any required request headers.
### **Body**
**Type:** string | null
The `body` field is used to supply a raw request body.
> [!NOTE]
> Set the request body to **null** if there's no need to send a request body.
## Response
### **StatusCode**
**Type:** int
The `statusCode` field is used to validate the matching response status code and further minimize the chances of false positive results.
### **Detection Fingerprints**
**Type:** string array
The `detectionFingerprints` field supports enumeration & validation of a third-party service for your target. These fingerprints are used to mark the detection of a service or instance. Make sure to define strict regex patterns or keywords to minimize the chances of false positive results.
> [!TIP]
> Regex patterns are supported!
### **Fingerprints**
**Type:** string array
The `fingerprints` field is used to validate the existence of a misconfigured third-party service for your target. Make sure to define strict regex patterns or keywords to minimize the chances of false positive results.
> [!TIP]
> Regex patterns are supported!
## Metadata
### **Service**
**Type:** string
The `service` field is used to display the service name in the CLI output results to visually confirm which service is currently being scanned.
### **Description**
**Type:** string
The `description` field displays the service description in the CLI output once a service has been enumerated or identified and confirmed vulnerable.
### **Reproduction Steps**
**Type:** string array
The `reproductionSteps` field reports back on how to reproduce the found misconfiguration. These steps are derived from this documentation.
> [!NOTE]
> Each step should be in a separate array entry. You can specify as many steps as you'd like to.
### **References**
**Type:** string array
The' references' field documents enumerated and misconfigured services. These references are derived from this documentation.
> [!NOTE]
> Each reference should be in a separate array entry. You can specify as many references as you'd like to.
# Contributions
Misconfig Mapper is open-source and made for the community! We encourage you to contribute to the project! Please see the [Contributing guideline](CONTRIBUTING.md) on how to contribute and further improve Misconfig Mapper!
# License
This project is licensed and available under the [MIT License](LICENSE.md).
", Assign "at most 3 tags" to the expected json: {"id":"10037","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"