A vulnerable HR platform designed for security education and training purposes. This application demonstrates various security vulnerabilities including Prompt Injections, XSS, SQL Injection, and LLM Unbounded Consumption.
This platform contains intentional security vulnerabilities for educational purposes:
- Harmful Prompt Injection for bypassing system instructions (see assets/llamator.ipynb)
- Indirect Prompt Injection attacks via malicious CV (see assets/CV)
- Privilege Escalation via Text2SQL (see assets/Text2sql)
- Cross-Site Scripting (see assets/XSS)
- Data exfiltration via Telegram MCP server or SSRF via MCP (TODO)
- Unbounded Consumption (see assets/llamator.ipynb)
For agents visualization and threat modeling see assets/AgentWiz
- Backend: Python FastAPI with raw SQL execution (bypassing SQLAlchemy's built-in protections)
- Frontend: Vue.js 3 with unsafe content rendering
- Database: PostgreSQL with sample data
- AI Multiagent: CrewAI multiagent connected to OpenAI-compatible API (TODO: add MCP)
- Reverse Proxy: Nginx
- Browse job openings
- AI-powered agentic chat with CV upload for application
- Dashboard for managing applications
- CV AI scoring (0-10 scale)
- Docker and Docker Compose
- OpenAI API key
- Clone the repository
git clone https://github.com/nizamovtimur/big-kahuna-burger.git
cd big-kahuna-burger- Set up environment variables in .env file
OPENAI_API_KEY=your_openai_api_key_here
OPENAI_MODEL=gpt-4.1-mini
OPENAI_BASE_URL=https://api.openai.com/v1
- Start the application
docker-compose --env-file .env up -d --build- Access the application: http://localhost:8080
The backend will automatically populate the database with mock data when it starts up if the database is empty.
The following accounts are automatically created when the backend starts:
HR Accounts:
- Username:
hr_admin/ Password:pass1234 - Username:
manager1/ Password:pass1234
Candidate Accounts:
- Username:
candidate1/ Password:pass1234 - Username:
candidate2/ Password:pass1234
Test Account:
- Username:
testuser/ Password:pass1234
This project is licensed under the Apache 2.0 License - see the LICENSE file for details.
This software is provided for educational and research purposes only. The authors are not responsible for any misuse of this software. Do not use this software to attack systems you do not own or have explicit permission to test.