Releases: gocortexio/gocortexbrokenbank
v1.4.0
GoCortex Broken Bank v1.4.0 - Jackpotting In Mars!
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Whats New In 1.4.0
- Add React/Next.js SpaceATM Terminal on port 7777 exposing CVE-2025-55182 (React2Shell) via Next.js 16.0.6 and React 19.2.0
- Add ATM service manual to vulnerable_data for credential discovery
- Pin core dependencies in requirements.txt to known vulnerable versions (Flask 2.0.1, Werkzeug 2.0.1, Jinja2 3.0.1, SQLAlchemy 1.4.23, requests 2.25.1) and remove conflicting unpinned duplicates
Docker Hub (Pre-Built Image)
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 7777:7777 \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
v1.3.6
GoCortex Broken Bank v1.3.6 - Going to Mars with PROJECT ARES!
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Whats New In 1.3.6
- Add AGPL-3.0-or-later licence to project and source files
- Update GitHub and Docker Hub Actions workflows to support ARM64 architecture
- Add PROJECT ARES - Mars Banking Initiative exposed Git repository
- Simulates data exfiltration attack surface via intentionally exposed .git directory
- Contains fictional "Mars Banking Initiative" joint venture documents
- Includes hardcoded AWS credentials, API keys, and database connection strings for secret detection testing
- Features financial projections, patent strategies, and source code for SpaceATM, Mars Gateway, Quantum Ledger, and Orbital Authentication modules
- Enhance exploitation proofs for multiple web application endpoints
- Improve JWT decoding and add chained attack tests
Running the Application
Option 1: Local Development
# Application runs on port 5000
# Application available at http://localhost:5000Option 2: Docker Hub (Pre-Built Image)
# Pull and run pre-built image from Docker Hub
docker pull gocortexio/gocortexbrokenbank:latest
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 3: Docker Deployment (Build from Source)
# Using Docker Compose (Recommended)
./deploy.sh
# Or manually:
docker-compose up --build -d
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 4: Direct Docker Build
# Build and run container (exposes both Flask:8888 and Tomcat:9999)
docker build -t gocortex-broken-bank .
docker run -d -p 8888:8888 -p 9999:8080 --name gocortex-broken-bank gocortex-broken-bankOption 5: Manual Gunicorn
# Run directly on port 8888
gunicorn --bind 0.0.0.0:8888 --workers 1 --reload main:appv1.3.2
GoCortex Broken Bank v1.3.2
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Whats New In 1.3
Log Shipping
- HTTP POST-based log shipping to external SIEM platforms
- Three log types: tomcat_access, netbank_application, netbank_auth
- Authentication support: none, header, basic, bearer
- Background auth traffic generator (4 events/minute, 5% anomaly rate)
- Anomaly seeding via config/anomaly_seeds.yaml
- Environment variables: LOG_ENDPOINT_* and LOG_AUTH_*
IaC Security Testing
- Dockerfile.BrokenBank with 30+ policy violations for scanner validation
- Certificate validation bypasses (curl, wget, pip, npm, git)
- Package manager insecurities (apt, yum, rpm, apk)
- Hardcoded credentials and privilege escalation patterns
Kubernetes Support
- Deployment manifest: k8s/gocortexbrokenbank.yaml
- LOCALE environment variable for localisation
Running the Application
Option 1: Local Development
# Application runs on port 5000
# Application available at http://localhost:5000Option 2: Docker Hub (Pre-Built Image)
# Pull and run pre-built image from Docker Hub
docker pull gocortexio/gocortexbrokenbank:latest
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 3: Docker Deployment (Build from Source)
# Using Docker Compose (Recommended)
./deploy.sh
# Or manually:
docker-compose up --build -d
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 4: Direct Docker Build
# Build and run container (exposes both Flask:8888 and Tomcat:9999)
docker build -t gocortex-broken-bank .
docker run -d -p 8888:8888 -p 9999:8080 --name gocortex-broken-bank gocortex-broken-bankOption 5: Manual Gunicorn
# Run directly on port 8888
gunicorn --bind 0.0.0.0:8888 --workers 1 --reload main:appv1.2.73
GoCortex Broken Bank v1.2.73
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Running the Application
Option 1: Local Development
# Application runs on port 5000
# Application available at http://localhost:5000Option 2: Docker Hub (Pre-Built Image)
# Pull and run pre-built image from Docker Hub
docker pull gocortexio/gocortexbrokenbank:latest
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 3: Docker Deployment (Build from Source)
# Using Docker Compose (Recommended)
./deploy.sh
# Or manually:
docker-compose up --build -d
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 4: Direct Docker Build
# Build and run container (exposes both Flask:8888 and Tomcat:9999)
docker build -t gocortex-broken-bank .
docker run -d -p 8888:8888 -p 9999:8080 --name gocortex-broken-bank gocortex-broken-bankOption 5: Manual Gunicorn
# Run directly on port 8888
gunicorn --bind 0.0.0.0:8888 --workers 1 --reload main:appv1.2.72
GoCortex Broken Bank v1.2.72
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Running the Application
Option 1: Local Development
# Application runs on port 5000
# Application available at http://localhost:5000Option 2: Docker Hub (Pre-Built Image)
# Pull and run pre-built image from Docker Hub
docker pull gocortexio/gocortexbrokenbank:latest
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 3: Docker Deployment (Build from Source)
# Using Docker Compose (Recommended)
./deploy.sh
# Or manually:
docker-compose up --build -d
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 4: Direct Docker Build
# Build and run container (exposes both Flask:8888 and Tomcat:9999)
docker build -t gocortex-broken-bank .
docker run -d -p 8888:8888 -p 9999:8080 --name gocortex-broken-bank gocortex-broken-bankOption 5: Manual Gunicorn
# Run directly on port 8888
gunicorn --bind 0.0.0.0:8888 --workers 1 --reload main:appv1.2.71
GoCortex Broken Bank v1.2.71
Overview
GoCortex Broken Bank is an intentionally vulnerable application designed specifically to support Palo Alto Networks Cortex Cloud + Palo Alto Networks Cortex XSIAM/XDR training. This application serves as a comprehensive testing ground for CI/CD security validation pipelines, featuring a wide range of deliberately implemented security vulnerabilities that mirror real-world common misconfigurations ready for assessment and exploitation.
Purpose
This application is purpose-built for:
- Cortex Cloud Application Security Testing - Validate your Cortex Cloud security policies
- CI/CD Pipeline Integration - Test automated security scanning in DevSecOps workflows
- Security Tool Benchmarking - Measure the effectiveness of application security testing tools
- Educational Training - Learn about common application security vulnerabilities in a controlled environment
Running the Application
Option 1: Local Development
# Application runs on port 5000
# Application available at http://localhost:5000Option 2: Docker Hub (Pre-Built Image)
# Pull and run pre-built image from Docker Hub
docker pull gocortexio/gocortexbrokenbank:latest
docker run -d \
--name gocortex-broken-bank \
--restart unless-stopped \
-p 8888:8888 \
-p 9999:8080 \
-e SESSION_SECRET=hardcoded-docker-secret-key \
-e DATABASE_URL=sqlite:///app/instance/gocortexbrokenbank.db \
-e FLASK_ENV=production \
-v ./instance:/app/instance \
gocortexio/gocortexbrokenbank:latest
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 3: Docker Deployment (Build from Source)
# Using Docker Compose (Recommended)
./deploy.sh
# Or manually:
docker-compose up --build -d
# Flask/Gunicorn available at http://localhost:8888
# Tomcat/Java exploits available at http://localhost:9999Option 4: Direct Docker Build
# Build and run container (exposes both Flask:8888 and Tomcat:9999)
docker build -t gocortex-broken-bank .
docker run -d -p 8888:8888 -p 9999:8080 --name gocortex-broken-bank gocortex-broken-bankOption 5: Manual Gunicorn
# Run directly on port 8888
gunicorn --bind 0.0.0.0:8888 --workers 1 --reload main:app










