Remove mock LLM server and related configurations; update README and exploit tests for clarity
This commit is contained in:
@@ -1,3 +1,4 @@
|
||||
SECRET_API_KEY=sk-supersecret12345
|
||||
DATABASE_PASSWORD=admin123
|
||||
AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
|
||||
# TEST DATA - Demonstrates path traversal can read sensitive files
|
||||
# If this content appears in POC output, the vulnerability is confirmed
|
||||
SENSITIVE_DATA_MARKER=PATH_TRAVERSAL_VULNERABILITY_CONFIRMED
|
||||
TEST_SECRET=this_file_should_not_be_readable_from_workspace
|
||||
|
||||
Reference in New Issue
Block a user