You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SecNode is an autonomous API security testing agent. It starts with an OpenAPI/Swagger spec and uses a mix of traditional security tools and LLM reasoning to find vulnerabilities like BOLA, mass assignment, and business logic flaws.
AI-augmented, schema-driven API penetration testing from OpenAPI/Swagger specs, with asynchronous execution and structured reporting.
8
+
9
+
## Why SecNode API
10
+
11
+
SecNode API helps security engineers and backend teams run repeatable API risk assessments in staging and CI without writing one-off test scripts for every target.
12
+
13
+
- Ingests local or remote OpenAPI/Swagger schema files
14
+
-**Phase 1c Deep Recon:** Automatically analyzes body schemas and uses AI to plan `arjun` parameter discovery.
15
+
-**Tool Orchestration:** Integrates `nuclei`, `sqlmap`, and `dirsearch` directly into the agent reasoning.
16
+
-**AI-Driven Logic:** Uses an LLM to understand API behavior and generate adversarial test cases.
17
+
-**Autonomous Agent:** Supports iterative replanning with request budgets and finding deduplication.
18
+
-**Reporting:** Produces both human-readable Markdown and machine-readable JSON findings.
4
19
5
20
## How it works
6
21
7
-
The pipeline runs in four distinct stages to ensure both shallow and deep coverage:
22
+
The pipeline runs in four distinct stages:
8
23
9
-
1.**Reconnaissance (Phase 1a/1b/1c)**
10
-
-**Active Fuzzing:** Probes for undocumented paths, admin panels, and common file exposures.
11
-
-**Tool Orchestration:** Runs `dirsearch`for directory discovery and `nuclei` for template-based scanning.
12
-
-**Deep Analysis (New):** Deep-parses the API specification to pull out body fields and nested parameters. It then uses AI to plan and run `arjun` for hidden parameter discovery.
24
+
1.**Reconnaissance (Phase 1a-c)**
25
+
-**Active Fuzzing:** Probes for undocumented pathsand common exposures.
26
+
-**Tool Orchestration:** Runs `dirsearch` and `nuclei` for automated scanning.
27
+
-**Deep Recon:** Deep-parses the spec for body fields and uses AI to find hidden parameters with `arjun`.
13
28
2.**AI Analysis (Phase 2)**
14
-
- An LLM analyzes the discovered API structure to understand business context and identify high-risk flows.
15
-
-It generates adversarial test cases specifically tailored to the API's logic.
29
+
- An LLM builds a business context model and identifies high-risk flows.
30
+
-Generates adversarial test cases tailored to the specific API logic.
16
31
3.**Execution & Validation (Phase 3)**
17
-
-The agent executes the tests using adaptive concurrency.
18
-
-Responses are analyzed by the AI to distinguish between real vulnerabilities and false positives.
32
+
-Async execution of generated tests.
33
+
-AI-based validation to confirm findings and assign CVSS scores.
19
34
4.**Deduplication (Phase 4)**
20
-
-The agent clusters findings sharing a root cause so you don't get 50 reports for the same underlying bug.
35
+
-Clusters duplicate findings by root cause to provide a clean, actionable report.
21
36
22
-
## Getting Started
37
+
## Installation
23
38
24
-
### Prerequisites
25
-
- Python 3.10+
26
-
-An API key for OpenAI, Anthropic, or Nebius
27
-
- Docker (recommended for running the integrated tools)
39
+
### Requirements
40
+
- Python 3.9+
41
+
-LLM API Key (OpenAI, Anthropic, or Nebius)
42
+
- Docker (optional, but recommended for tool orchestration)
0 commit comments