📦 Pilot — 飞行员
v1.0.0渗透测试设置 部署一个包含 4 个 Agent 的自动化渗透测试流水线。 适用场景: 1. 用户希望建立渗透测试或安全评估流水线……
详细分析 ▾
运行时依赖
版本
初始版本
安装命令
点击复制技能文档
部署 4 个 agent,分别负责 recon、漏洞扫描、exploit 验证与报告生成。
角色
| 角色 | 主机名 | Skills | 用途 |
|----------|-------------------|------------------------------------------------------------------------|------------------------------|
| recon | -recon | pilot-discover, pilot-stream-data, pilot-archive | DNS 枚举、端口扫描、服务指纹 |
| scanner | -scanner | pilot-task-parallel, pilot-metrics, pilot-dataset | 漏洞扫描、CVE 比对、配置核查 |
| exploiter| -exploiter| pilot-task-chain, pilot-audit-log, pilot-receipt | 安全 PoC 验证、确认可利用性 |
| reporter | -reporter| pilot-webhook-bridge, pilot-share, pilot-slack-bridge | 生成含风险评级与修复建议的报告 |
部署步骤
步骤 1: 询问用户该 agent 的角色与前缀。
步骤 2: 为对应角色安装 skills:
``bash
# recon:
clawhub install pilot-discover pilot-stream-data pilot-archive
# scanner:
clawhub install pilot-task-parallel pilot-metrics pilot-dataset
# exploiter:
clawhub install pilot-task-chain pilot-audit-log pilot-receipt
# reporter:
clawhub install pilot-webhook-bridge pilot-share pilot-slack-bridge
`
步骤 3: 设置主机名:
`bash
pilotctl --json set-hostname -
`
步骤 4: 写入配置清单:
`bash
mkdir -p ~/.pilot/setups
cat > ~/.pilot/setups/penetration-testing.json << 'MANIFEST'
MANIFEST
`
步骤 5: 提示用户与直连 peer 完成握手。
各角色清单模板
recon
`json
{
"setup": "penetration-testing",
"setup_name": "Penetration Testing",
"role": "recon",
"role_name": "Reconnaissance Agent",
"hostname": "-recon",
"description": "执行被动与主动侦察——DNS 枚举、端口扫描、服务指纹。",
"skills": {
"pilot-discover": "枚举 DNS 记录、子域与服务端点。",
"pilot-stream-data": "实时流式输出端口扫描与指纹结果。",
"pilot-archive": "归档 recon 快照以供基线对比。"
},
"peers": [{"role": "scanner", "hostname": "-scanner", "description": "接收 recon 结果进行漏洞扫描"}],
"data_flows": [{"direction": "send", "peer": "-scanner", "port": 1002, "topic": "recon-result", "description": "包含目标画像与服务的 recon 结果"}],
"handshakes_needed": ["-scanner"]
}
` scanner
`json
{
"setup": "penetration-testing",
"setup_name": "Penetration Testing",
"role": "scanner",
"role_name": "Vulnerability Scanner",
"hostname": "-scanner",
"description": "运行自动化漏洞扫描、比对 CVE 数据库、识别配置错误。",
"skills": {
"pilot-task-parallel": "并行运行多款扫描工具覆盖目标服务。",
"pilot-metrics": "跟踪扫描覆盖率、发现数量与严重级别分布。",
"pilot-dataset": "存储 CVE 匹配与漏洞元数据。"
},
"peers": [
{"role": "recon", "hostname": "-recon", "description": "发送 recon 结果"},
{"role": "exploiter", "hostname": "-exploiter", "description": "接收漏洞发现"}
],
"data_flows": [
{"direction": "receive", "peer": "-recon", "port": 1002, "topic": "recon-result", "description": "包含目标画像与服务的 recon 结果"},
{"direction": "send", "peer": "-exploiter", "port": 1002, "topic": "vulnerability", "description": "含 CVE 与严重级别的漏洞发现"}
],
"handshakes_needed": ["-recon", "-exploiter"]
}
` exploiter
``json
{
"setup": "penetration-testing",
"setup_name": "Penetration Testing",
"role": "exploiter",
"role_name": "Exploit Validator",
"hostname": "-exploiter",
"description": "通过安全 PoC 测试验证已发现漏洞,确认可利用性。",
"skills": {
"pilot-task-chain"