ExaAi - Advanced AI Security Agent for Comprehensive Penetration Testing
Project description
ExaAiAgent
Advanced AI-Powered Cybersecurity Agent for Comprehensive Penetration Testing
[!TIP] 🚀 v2.1.0 Released! React2Shell Detection (CVE-2025-55182), Cloud Security Testing, Smart Fuzzing, and CLI improvements with
exaaicommand!
🔥 What's New in v2.1.0
🚨 React2Shell Detection (CVE-2025-55182)
New critical vulnerability scanner for React Server Components:
- CVSS 10.0 - Unauthenticated RCE via RSC Flight protocol
- Auto-detects Next.js 15.x/16.x, React 19.x applications
- Complete exploitation methodology and PoC generation
- WAF bypass techniques included
☁️ AWS & Cloud Security
Comprehensive cloud infrastructure testing:
- AWS: EC2 Metadata SSRF, S3 buckets, IAM escalation, Lambda
- Azure: Blob storage, Managed Identity, Azure AD
- GCP: Cloud Storage, Service Account abuse
- Kubernetes: RBAC, Secrets, Pod escape
� Smart Security Tools
| Tool | Capability |
|---|---|
| Smart Fuzzer | Context-aware payloads, parameter type detection |
| Response Analyzer | SQL errors, stack traces, sensitive data detection |
| Vuln Validator | PoC generation, CVSS scoring, remediation advice |
| WAF Bypass | Multi-layer bypass techniques |
⚡ CLI Improvements
# New command (shorter!)
exaai --target https://example.com
# Version check
exaai --version
# TUI mode
exaai tui
🔥 ExaAiAgent Overview
ExaAiAgent is an elite AI-powered cybersecurity agent that acts like a real penetration tester - running your code dynamically, finding vulnerabilities, and validating them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing.
Key Capabilities:
- 🔧 Full hacker toolkit out of the box
- 🤝 Teams of agents that collaborate and scale
- ✅ Real validation with PoCs, not false positives
- 💻 Developer‑first CLI with actionable reports
- 🔄 Auto‑fix & reporting to accelerate remediation
- 🧠 Multi-LLM Support - OpenAI, Anthropic, Gemini, local models
- 🌐 Cloud & Container Security testing capabilities
- 🚀 Smart Module Loading - Auto-detects and loads relevant modules
🎯 Use Cases
- Application Security Testing - Detect and validate critical vulnerabilities
- Rapid Penetration Testing - Get pentests done in hours, not weeks
- Bug Bounty Automation - Automate research and generate PoCs
- CI/CD Integration - Block vulnerabilities before production
- API Security Testing - REST, GraphQL, gRPC security analysis
- Cloud Security - AWS, Azure, GCP configuration review
🚀 Quick Start
Prerequisites:
- Docker (running)
- Python 3.12+
- An LLM provider (OpenAI, Anthropic, OpenRouter, Ollama, or any compatible provider)
Installation & First Scan
# Install ExaAiAgent
pipx install exaai-agent
# Configure your AI provider (choose one)
# Option 1: OpenAI
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-openai-key"
# Option 2: Anthropic
export EXAAI_LLM="anthropic/claude-sonnet-4-5"
export LLM_API_KEY="your-anthropic-key"
# Option 3: OpenRouter (access multiple models)
export EXAAI_LLM="openrouter/auto"
export LLM_API_KEY="your-openrouter-key"
export LLM_API_BASE="https://openrouter.ai/api/v1"
# Option 4: Ollama (local models)
export EXAAI_LLM="ollama/llama3"
export LLM_API_BASE="http://localhost:11434"
# Run your first security assessment (auto-detects modules!)
exaai --target https://your-app.com
[!NOTE] First run automatically pulls the sandbox Docker image. Results are saved to
exaai_runs/<run-name>
✨ Features
🛠️ Agentic Security Tools
ExaAiAgent agents come equipped with a comprehensive security testing toolkit:
- Full HTTP Proxy - Request/response manipulation and analysis
- Browser Automation - Multi-tab browser for XSS, CSRF, auth flows
- Terminal Environments - Interactive shells for command execution
- Python Runtime - Custom exploit development and validation
- Reconnaissance - Automated OSINT and attack surface mapping
- Code Analysis - Static and dynamic analysis capabilities
- API Fuzzing - Advanced REST/GraphQL API testing
🎯 Comprehensive Vulnerability Detection
ExaAiAgent identifies and validates a wide range of security vulnerabilities:
| Category | Vulnerabilities |
|---|---|
| Access Control | IDOR, privilege escalation, auth bypass |
| Injection | SQL, NoSQL, Command, GraphQL injection |
| Server-Side | SSRF, XXE, deserialization flaws |
| Client-Side | XSS, prototype pollution, DOM vulnerabilities |
| Business Logic | Race conditions, workflow manipulation |
| Authentication | JWT vulnerabilities, OAuth/OIDC flaws, session management |
| WebSocket | CSWSH, message injection, DoS |
| Infrastructure | Subdomain takeover, misconfigurations |
| WAF Bypass | Encoding, smuggling, header manipulation |
🕸️ Graph of Agents
Advanced multi-agent orchestration for comprehensive security testing:
- Distributed Workflows - Specialized agents for different attacks
- Scalable Testing - Parallel execution for fast coverage
- Dynamic Coordination - Agents collaborate and share discoveries
💻 Usage Examples
Basic Usage
# Scan a local codebase
exaai --target ./app-directory
# Security review of a GitHub repository
exaai --target https://github.com/org/repo
# Black-box web application assessment
exaai --target https://your-app.com
Smart Auto-Loading (New in v2.0!)
# GraphQL endpoint - auto-loads graphql_security
exaai --target https://api.example.com/graphql
# WebSocket - auto-loads websocket_security
exaai --target wss://chat.example.com/socket
# OAuth endpoint - auto-loads oauth_oidc
exaai --target https://auth.example.com/oauth/authorize
# Subdomain recon - auto-loads subdomain_takeover
exaai --target example.com --instruction "enumerate subdomains"
Advanced Testing Scenarios
# Grey-box authenticated testing
exaai --target https://your-app.com --instruction "Perform authenticated testing using credentials: user:pass"
# Multi-target testing (source code + deployed app)
exaai -t https://github.com/org/app -t https://your-app.com
# With specific modules (overrides auto-detection)
exaai --target https://api.example.com --prompt-modules graphql_security waf_bypass
# Lightweight mode (reduced token consumption)
export EXAAI_LIGHTWEIGHT_MODE=true
exaai --target https://example.com --instruction "quick security scan"
🤖 Headless Mode
Run ExaAiAgent programmatically without interactive UI:
exaai -n --target https://your-app.com
🔄 CI/CD (GitHub Actions)
name: exaai-security-test
on:
pull_request:
jobs:
security-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install ExaAiAgent
run: pipx install exaai-agent
- name: Run ExaAiAgent
env:
EXAAI_LLM: ${{ secrets.EXAAI_LLM }}
LLM_API_KEY: ${{ secrets.LLM_API_KEY }}
run: exaai -n -t ./
⚙️ Configuration
# Required
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"
# Optional - Performance tuning
export EXAAI_LIGHTWEIGHT_MODE=true # Reduced token consumption
export EXAAI_MAX_TOKENS=2048 # Max output tokens
export LLM_API_BASE="your-api-base" # For local models
export PERPLEXITY_API_KEY="key" # For search capabilities
Recommended Models:
- OpenAI GPT-5 (
openai/gpt-5) - Anthropic Claude Sonnet 4.5 (
anthropic/claude-sonnet-4-5) - Google Gemini 2.0 (
gemini/gemini-2.0-flash)
📦 Available Security Modules
Vulnerability Modules
| Module | Description |
|---|---|
sql_injection |
SQL/NoSQL injection testing |
xss |
Cross-site scripting attacks |
ssrf |
Server-side request forgery |
xxe |
XML external entity attacks |
rce |
Remote code execution |
idor |
Insecure direct object reference |
authentication_jwt |
Auth & JWT vulnerabilities |
business_logic |
Business logic flaws |
csrf |
Cross-site request forgery |
race_condition |
Race condition exploits |
graphql_security |
GraphQL-specific attacks |
websocket_security |
WebSocket vulnerabilities |
oauth_oidc |
OAuth2/OIDC flaws |
waf_bypass |
WAF bypass techniques |
subdomain_takeover |
Subdomain takeover |
🆕 Changelog
v2.0.0 (Latest)
- ✨ Smart Auto-Module Loading - Automatically detects target type
- ⚡ Token Optimization - Lightweight mode & task scaling
- 🛡️ 5 New Security Modules - GraphQL, WebSocket, OAuth, WAF, Subdomain
- 🎨 New UI/Branding - Fresh ExaAi logo with Cyan/Purple theme
- 📊 Improved Performance - Reduced unnecessary LLM calls
v1.0.0
- Multi-LLM Load Balancing
- Enhanced Context Management
- Specialized Agents
- Advanced Prompts
- Improved Reporting
🤝 Contributing
We welcome contributions! Check out our Contributing Guide.
🌟 Support the Project
Love ExaAiAgent? Give us a ⭐ on GitHub!
🙏 Acknowledgements
ExaAiAgent builds on incredible open-source projects like LiteLLM, Caido, ProjectDiscovery, Playwright, and Textual.
[!WARNING] Only test apps you own or have permission to test. You are responsible for using ExaAiAgent ethically and legally.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file exaai_agent-2.0.9.tar.gz.
File metadata
- Download URL: exaai_agent-2.0.9.tar.gz
- Upload date:
- Size: 303.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1aab7170d74b090268820852d112b3cae753dc8eeb91a031a90b109bfabf253b
|
|
| MD5 |
3a401b6d445c89e486d6ef11a217b368
|
|
| BLAKE2b-256 |
59515ef3e0e8844f990f824047dfc6b2ea3f47f96c7e9b3a0a2dde48090fb12e
|
Provenance
The following attestation bundles were made for exaai_agent-2.0.9.tar.gz:
Publisher:
publish.yml on hleliofficiel/ExaAiAgent
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
exaai_agent-2.0.9.tar.gz -
Subject digest:
1aab7170d74b090268820852d112b3cae753dc8eeb91a031a90b109bfabf253b - Sigstore transparency entry: 763767394
- Sigstore integration time:
-
Permalink:
hleliofficiel/ExaAiAgent@b5c50cb1f996a1031d735fa9a1fb048ae10ff83b -
Branch / Tag:
refs/tags/v2.0.9 - Owner: https://github.com/hleliofficiel
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@b5c50cb1f996a1031d735fa9a1fb048ae10ff83b -
Trigger Event:
push
-
Statement type:
File details
Details for the file exaai_agent-2.0.9-py3-none-any.whl.
File metadata
- Download URL: exaai_agent-2.0.9-py3-none-any.whl
- Upload date:
- Size: 369.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2bca17addf87b88b91e2622adedf1b56a959653c34dbcdf5e5b929f23cfb8dcc
|
|
| MD5 |
7bce7f38267b06ebfa779336837fee0f
|
|
| BLAKE2b-256 |
1d8dd269da654c076d0ab2eccdd8accf2d051da1ba3c22916ee0dd54394b9805
|
Provenance
The following attestation bundles were made for exaai_agent-2.0.9-py3-none-any.whl:
Publisher:
publish.yml on hleliofficiel/ExaAiAgent
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
exaai_agent-2.0.9-py3-none-any.whl -
Subject digest:
2bca17addf87b88b91e2622adedf1b56a959653c34dbcdf5e5b929f23cfb8dcc - Sigstore transparency entry: 763767395
- Sigstore integration time:
-
Permalink:
hleliofficiel/ExaAiAgent@b5c50cb1f996a1031d735fa9a1fb048ae10ff83b -
Branch / Tag:
refs/tags/v2.0.9 - Owner: https://github.com/hleliofficiel
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@b5c50cb1f996a1031d735fa9a1fb048ae10ff83b -
Trigger Event:
push
-
Statement type: