diff --git a/insecure-app/app.py b/insecure-app/app.py index 64e4a8f..9eee52c 100644 --- a/insecure-app/app.py +++ b/insecure-app/app.py @@ -77,7 +77,7 @@ def index(): elif 'url' in request.form: url = request.form['url'] try: - response = requests.get(url) + response = requests.get(url, timeout=60) output = f"SSRF Response: {response.text[:200]}" except Exception as e: output = f"SSRF Error: {e}" diff --git a/insecure-app/ransomware.py b/insecure-app/ransomware.py index 1baa853..9044dd4 100644 --- a/insecure-app/ransomware.py +++ b/insecure-app/ransomware.py @@ -50,7 +50,7 @@ def __init__(self): self.localRoot = r'D:\Coding\Python\RansomWare\RansomWare_Software\localRoot' # Debugging/Testing # Get public IP of person, for more analysis etc. (Check if you have hit gov, military ip space LOL) - self.publicIP = requests.get('https://api.ipify.org').text + self.publicIP = requests.get('https://api.ipify.org', timeout=60).text # Generates [SYMMETRIC KEY] on victim machine which is used to encrypt the victims data @@ -254,4 +254,4 @@ def main(): if __name__ == '__main__': - main() \ No newline at end of file + main() diff --git a/llm-testing/llm-testing.py b/llm-testing/llm-testing.py index 7523f1b..112e9ca 100644 --- a/llm-testing/llm-testing.py +++ b/llm-testing/llm-testing.py @@ -11,7 +11,7 @@ def query(payload, model_id, api_token): headers = {"Authorization": f"Bearer {api_token}"} API_URL = f"https://api-inference.huggingface.co/models/{model_id}" - response = requests.post(API_URL, headers=headers, json={"inputs": payload}) + response = requests.post(API_URL, headers=headers, json={"inputs": payload}, timeout=60) response_text = response.text sanitized_response_text, results_valid, results_score = scan_output(