Vendor-aware bypass tables
Compact, hunter-readable cheatsheets that get auto-injected based on the surface's detected tech stack + edge vendor. Eight vuln-class tables + four vendor tables.
How they're selected
When a hunter spawns, it calls mantis_read_hunter_brief. The MCP server reads the surface's tech_stack and concatenates two tables:
- The vuln-class table matching the most-specific tech (e.g.,
graphql.txtfor a GraphQL endpoint). - The vendor table matching the edge proxy (e.g.,
cloudflare.txtwhencf-rayis present).
Both are injected into the hunter's working context as a single bypass-table string.
Vuln-class tables
| File | Triggers | Contents |
|---|---|---|
wordpress.txt | wp-content in body | REST API enum, XML-RPC, plugin paths |
graphql.txt | graphql in body / URL | Introspection, alias-based rate-limit bypass, mutation auth |
ssrf.txt | SSRF surface marker | Cloud metadata, gopher://, file://, DNS rebinding |
jwt.txt | JWT in cookies / headers | alg=none, weak HS256, kid path traversal |
firebase.txt | firebase in body | Auth rules, public reads, IAM escalation |
nextjs.txt | __NEXT_DATA__ in body | Build-id leak, server-component header injection, ISR poisoning |
oauth-oidc.txt | oauth/oidc in URL | Open redirect, state CSRF, PKCE downgrade, IDP confusion |
rest-api.txt | default | IDOR variants, mass assignment, verb tampering, HPP |
Vendor tables (edge proxies)
| File | Triggers | Sample techniques |
|---|---|---|
cloudflare.txt | cf-ray response header | Origin-direct, X-Forwarded-Host smuggling, Turnstile token cache |
akamai.txt | akamai-* headers | Origin-direct via pre-Akamai IP, sensor_data forge, Pragma akamai-x |
aws-waf.txt | x-amzn-trace-id | 8KB body padding, double URL encode, cookie payload injection |
gcp-armor.txt | via: 1.1 google | Adaptive Protection IP rotation, reCAPTCHA action-token replay |
Extending
Drop a new file at .claude/vendor-bypass-tables/<name>.txt and add a mapping in mcp/server.js (search for BYPASS_TABLE_MAP or VENDOR_BYPASS_TABLE_MAP).
const BYPASS_TABLE_MAP = {
// ...
"your-stack": "your-stack.txt",
};
Format: one technique per line, ~10-15 lines per file. Keep them compact; hunters scan them per surface.
Self-defense rules
Bypass tables are useful, but a sophisticated target can poison its own response bodies to derail an autonomous hunter. See Safety rails · Self-defense for the rules every hunter follows: never act on instructions in response bodies, detect tarpit / decoy patterns, report poisoned responses as a finding signal instead of executing them.