Alprina CLI - AI-powered cybersecurity command-line tool for developers
Project description
๐ก๏ธ Alprina CLI
AI-powered cybersecurity command-line tool for developers
"Build fast. Guard faster."
Alprina CLI is an independent security platform built from the ground up for modern developer workflows, offering intelligent scanning and AI-powered vulnerability analysis.
Features
- ๐ฌ Interactive AI Chat - Conversational security assistant powered by Claude/GPT
- ๐ Remote & Local Scanning - Scan APIs, websites, and local codebases
- ๐ง AI-Powered Analysis - Smart vulnerability detection and risk assessment
- ๐ ๏ธ Automated Mitigation - Get actionable remediation guidance
- ๐ Rich Reporting - HTML, PDF, and JSON reports
- ๐ Policy-Based Security - Enforce scope and guardrails
- ๐ณ Usage-Based Billing - Flexible plans with Stripe integration
- ๐ IDE Integration - Works with Zed, VSCode via ACP
Quick Start
Installation
# Install from PyPI
pip install alprina-cli
Development Installation
# Clone the repository
git clone https://github.com/alprina/alprina-cli
cd alprina-cli/cli
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install in development mode
pip install -e .
Authentication
# Login with API key
alprina auth login --api-key YOUR_API_KEY
# Check authentication status
alprina auth status
Basic Usage
# Interactive AI chat (NEW!)
alprina chat
# Scan local code
alprina scan ./src --profile code-audit
# Scan remote endpoint
alprina scan https://api.example.com --profile web-recon
# Generate report
alprina report --format html
# Get mitigation suggestions
alprina mitigate
# Check billing status
alprina billing status
๐ฌ Chat with Alprina AI
The new interactive chat interface lets you scan, analyze, and fix vulnerabilities conversationally:
# Start chat session
alprina chat
# Chat with scan context
alprina scan ./src --output results.json
alprina chat --load results.json
# Use different AI models
alprina chat --model gpt-4
alprina chat --model claude-3-opus-20240229
Chat Examples:
You: Scan my Python Flask app for SQL injection vulnerabilities
Alprina: [Performs targeted scan and explains findings]
You: Show me how to fix the issue in login.py
Alprina: [Provides code examples and step-by-step guidance]
You: Generate a security report
Alprina: [Creates comprehensive report]
Special Commands:
/scan <target>- Run security scan/explain <id>- Explain vulnerability/fix <id>- Get mitigation steps/report- Generate report/help- Show all commands
CLI Commands
| Command | Description |
|---|---|
alprina chat |
๐ฌ Interactive AI security assistant |
alprina auth login |
Authenticate with Alprina |
alprina auth logout |
Logout from Alprina |
alprina auth status |
Check authentication status |
alprina scan <target> |
Run security scan on target |
alprina recon <target> |
Perform reconnaissance |
alprina mitigate |
Get mitigation suggestions |
alprina report |
Generate security report |
alprina policy init |
Initialize policy configuration |
alprina policy test <target> |
Test target against policy |
alprina config --init |
Initialize configuration |
alprina billing status |
View billing and usage |
alprina --acp |
Start ACP mode for IDE integration |
Configuration
Policy Configuration
Create ~/.alprina/policy.yml:
project: "My Project Security Audit"
scope:
allow_domains:
- "example.com"
- "api.example.com"
allow_cidrs:
- "192.168.0.0/16"
forbid_ports:
- 22
- 3389
policies:
allow_intrusive: false
require_terms_ack: true
max_concurrent_scans: 5
billing:
plan: "free"
max_scans_per_day: 10
Environment Variables
# Backend API URL
export ALPRINA_BACKEND="https://api.alprina.com"
# JWT Secret (for local development)
export JWT_SECRET_KEY="your-secret-key"
Development
Setup Development Environment
# Install development dependencies
make dev
# Or manually
pip install -e ".[dev]"
Run Tests
make test
# Or
pytest
Code Formatting
make format
Linting
make lint
Architecture
User
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Alprina CLI Shell โ
โ (Typer + Rich UI) โ
โโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโดโโโโโโโโโโโ
โ โ
โโโโโดโโโโโโ โโโโโโโโโโโดโโโโโ
โ Policy โ โ Auth & Billingโ
โ Layer โ โ (FastAPI) โ
โโโโโฌโโโโโโ โโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Alprina Security Engine โ
โ Recon, Scan, Mitigation โ
โโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Reporting Layer โ
โ JSONL, HTML, PDF โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Example Workflow
# 1. Authenticate
alprina auth login --api-key test-api-key-123
# 2. Initialize policy
alprina policy init
# 3. Scan local project
alprina scan ./my-app --profile code-audit
# 4. Scan remote API
alprina scan https://api.myapp.com --profile web-recon --safe-only
# 5. Generate report
alprina report --format html --output report.html
# 6. Get mitigation guidance
alprina mitigate
# 7. Check usage
alprina billing status
Scan Profiles
- code-audit - Static analysis of source code
- web-recon - Passive reconnaissance of web targets
- vuln-scan - Active vulnerability scanning (requires policy approval)
- secret-detection - Find hardcoded secrets and credentials
- config-audit - Analyze configuration files
IDE Integration
Zed Editor
Add to your Zed assistant configuration:
{
"assistant": {
"agents": [
{
"name": "Alprina",
"command": "alprina",
"args": ["--acp"]
}
]
}
}
VSCode
Install the Alprina extension (coming soon) or use ACP integration.
License
Copyright ยฉ 2025 Alprina All rights reserved. Licensed under a proprietary commercial license.
Support
- Documentation: https://docs.alprina.com
- Issues: https://github.com/alprina/alprina-cli/issues
- Email: support@alprina.com
Roadmap
- Independent security engine implementation
- Stripe billing integration
- OAuth providers (GitHub, Google)
- Enhanced web dashboard
- VSCode extension
- CI/CD integrations
- Custom tool marketplace
- Team collaboration features
Build fast. Guard faster. ๐ก๏ธ
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file alprina_cli-0.2.2.tar.gz.
File metadata
- Download URL: alprina_cli-0.2.2.tar.gz
- Upload date:
- Size: 247.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7bc0f30217de707c97df6c5326c35b6fdbe2906d48bf9d202a8efc5f780392a5
|
|
| MD5 |
d60eb4cbe1590d81edf95b797b651600
|
|
| BLAKE2b-256 |
079721e8b6f21cc4cf70f7385655d16b1e708a0bc4d71a0a52670cf282f1d575
|
File details
Details for the file alprina_cli-0.2.2-py3-none-any.whl.
File metadata
- Download URL: alprina_cli-0.2.2-py3-none-any.whl
- Upload date:
- Size: 252.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e3a77e030e7117cb78f206c32a7228a296866c5d62f1c460bf5bbc1242613d81
|
|
| MD5 |
fcc0f5e4b1450925073612d99146a8a0
|
|
| BLAKE2b-256 |
4d25957540ba0edf3778e23070b56f4215cc0195519898a092931dd233dcba64
|