__init__.py
1 """ 2 MCP Server 多轮自动化红队攻击框架 (Red Team) 3 4 三角色协作: 5 - Attacker Agent: 生成攻击 prompt 6 - Target Runner: 与被测 MCP Server 交互(当前为源码分析模式,LLM 模拟响应) 7 - Evaluator Agent: 对每轮攻击效果打分 1-10 8 9 支持策略:Crescendo(渐进式多轮升级)、TAP(Tree of Attacks with Pruning) 10 """ 11 12 from redteam.orchestrator import RedTeamOrchestrator 13 from redteam.attacker import AttackerAgent 14 from redteam.evaluator import EvaluatorAgent 15 from redteam.target import TargetRunner 16 from redteam.strategy import ( 17 CrescendoStrategy, 18 CrescendoPhase, 19 TAPStrategy, 20 AttackNode, 21 ConversationTurn, 22 ) 23 from redteam.report import generate_report 24 25 # OWASP Agentic Top 10 对齐的 6 个预定义攻击目标 26 ATTACK_TARGETS = [ 27 "data_exfiltration", # 数据窃取 28 "indirect_prompt_injection", # 间接提示注入 29 "ssrf_via_agent", # 经 Agent 的 SSRF 30 "rce_via_tool", # 经工具的 RCE 31 "privilege_escalation", # 权限提升 32 "tool_poisoning", # 工具投毒 33 ] 34 35 __all__ = [ 36 "RedTeamOrchestrator", 37 "AttackerAgent", 38 "EvaluatorAgent", 39 "TargetRunner", 40 "CrescendoStrategy", 41 "CrescendoPhase", 42 "TAPStrategy", 43 "AttackNode", 44 "ConversationTurn", 45 "generate_report", 46 "ATTACK_TARGETS", 47 ]