/ mcp-scan / redteam / __init__.py
__init__.py
 1  """
 2  MCP Server 多轮自动化红队攻击框架 (Red Team)
 3  
 4  三角色协作:
 5  - Attacker Agent: 生成攻击 prompt
 6  - Target Runner: 与被测 MCP Server 交互(当前为源码分析模式,LLM 模拟响应)
 7  - Evaluator Agent: 对每轮攻击效果打分 1-10
 8  
 9  支持策略:Crescendo(渐进式多轮升级)、TAP(Tree of Attacks with Pruning)
10  """
11  
12  from redteam.orchestrator import RedTeamOrchestrator
13  from redteam.attacker import AttackerAgent
14  from redteam.evaluator import EvaluatorAgent
15  from redteam.target import TargetRunner
16  from redteam.strategy import (
17      CrescendoStrategy,
18      CrescendoPhase,
19      TAPStrategy,
20      AttackNode,
21      ConversationTurn,
22  )
23  from redteam.report import generate_report
24  
25  # OWASP Agentic Top 10 对齐的 6 个预定义攻击目标
26  ATTACK_TARGETS = [
27      "data_exfiltration",           # 数据窃取
28      "indirect_prompt_injection",   # 间接提示注入
29      "ssrf_via_agent",              # 经 Agent 的 SSRF
30      "rce_via_tool",                # 经工具的 RCE
31      "privilege_escalation",        # 权限提升
32      "tool_poisoning",              # 工具投毒
33  ]
34  
35  __all__ = [
36      "RedTeamOrchestrator",
37      "AttackerAgent",
38      "EvaluatorAgent",
39      "TargetRunner",
40      "CrescendoStrategy",
41      "CrescendoPhase",
42      "TAPStrategy",
43      "AttackNode",
44      "ConversationTurn",
45      "generate_report",
46      "ATTACK_TARGETS",
47  ]