Nuclei Template Editor has AI to generate templates for vulnerability reports. This document helps to guide you through the process, offering you usage tips and examples.
Powered by public Nuclei templates and a rich CVE data set, the AI understands a broad array of security vulnerabilities. First, the system interprets the user’s prompt to identify a specific vulnerability. Then, it generates a template based on the steps required to reproduce the vulnerability along with all the necessary meta information to reproduce and remediate.
The application exposes sensitive information of a user (ID: 2) who is not the authenticated user (session: abcd1234), leading to an IDOR vulnerability.
Path Traversal vulnerability identified in a web application’s file download function. Here’s the PoC:
HTTP Response:HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 1337Server: Apache<html><p>Your VIP trial period has been extended by 7 days.</p></html>
The application does not limit the number of times the trial period can be extended, leading to a business logic vulnerability.
Each of these examples provides HTTP Requests and Responses to illustrate the vulnerabilities.
Please note that the current AI is trained primarily on HTTP data. Template generation for non-HTTP protocols is not supported at this time. Support for additional protocols is under development and will be available soon.