Skip to main content

ExaAi - Advanced AI Security Agent for Comprehensive Penetration Testing

Project description

ExaAiAgent Logo

ExaAiAgent

Advanced AI-Powered Cybersecurity Agent for Comprehensive Penetration Testing

Python PyPI License Version


[!TIP] 🚀 v2.1.2 Released! Now supports AI Agent Integration (OpenClaw), Kubernetes Security, Azure/GCP modules, and Prompt Injection detection.

🤖 Connect Your Agent: You can now control ExaAiAgent via any AI agent (OpenClaw, etc). Just send this command to your agent:

Read https://raw.githubusercontent.com/hleliofficiel/ExaAiAgent/main/SKILL.md and follow the instructions to join ExaAiAgent

🔥 What's New in v2.1.2

🤖 AI Agent Integration (OpenClaw)

Seamlessly integrate ExaAiAgent with your AI workforce:

  • Agent Control: Control scans via OpenClaw or any agent framework
  • Auto-Discovery: Agents can read SKILL.md to self-onboard
  • Output Optimization: Tools now output cleaner data (no ANSI codes) for LLM consumption

⚓ Kubernetes & Cloud Security (Updated)

Expanded coverage for cloud-native infrastructure:

  • Kubernetes: Deep RBAC auditing, Pod Security Standards (PSS), Network Policy checks
  • Azure: Blob Storage, Entra ID (Azure AD), Key Vault auditing
  • GCP: Cloud Storage, IAM, Service Account key leaks
  • Prompt Injection: Dedicated scanner for AI/LLM applications

🛡️ Smart Security Tools

Tool Capability
Smart Fuzzer Thread-safe, context-aware fuzzing with rate limiting
Response Analyzer SQL errors, stack traces, sensitive data detection
Vuln Validator PoC generation with false positive reduction
WAF Bypass Multi-layer bypass for Cloudflare, Akamai, AWS WAF

⚡ CLI & Stability

  • Thread-Safety: Fixed race conditions in async scans
  • Resource Management: Auto-shutdown and cleanup of background processes
  • Installation: Robust install.sh for Linux/macOS (bash/zsh/fish)
# New install script
curl -sSL https://raw.githubusercontent.com/hleliofficiel/ExaAiAgent/main/install.sh | bash

🔥 ExaAiAgent Overview

ExaAiAgent is an elite AI-powered cybersecurity agent that acts like a real penetration tester - running your code dynamically, finding vulnerabilities, and validating them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing.

Key Capabilities:

  • 🔧 Full hacker toolkit out of the box
  • 🤝 Teams of agents that collaborate and scale
  • Real validation with PoCs, not false positives
  • 💻 Developer‑first CLI with actionable reports
  • 🔄 Auto‑fix & reporting to accelerate remediation
  • 🧠 Multi-LLM Support - OpenAI, Anthropic, Gemini, local models
  • 🌐 Cloud & Container Security testing capabilities
  • 🚀 Smart Module Loading - Auto-detects and loads relevant modules

🎯 Use Cases

  • Application Security Testing - Detect and validate critical vulnerabilities
  • Rapid Penetration Testing - Get pentests done in hours, not weeks
  • Bug Bounty Automation - Automate research and generate PoCs
  • CI/CD Integration - Block vulnerabilities before production
  • API Security Testing - REST, GraphQL, gRPC security analysis
  • Cloud Security - AWS, Azure, GCP configuration review

🚀 Quick Start

Prerequisites:

  • Docker (running)
  • Python 3.12+
  • An LLM provider (OpenAI, Anthropic, OpenRouter, Ollama, or any compatible provider)

Installation & First Scan

# Install ExaAiAgent

# Method 1: Automated Script (Recommended)
pip install exaai-agent 
# Method 2: pipx
pipx install exaai-agent

# Configure your AI provider (choose one)

# Option 1: OpenAI
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-openai-key"

# Option 2: Anthropic
export EXAAI_LLM="anthropic/claude-sonnet-4-5"
export LLM_API_KEY="your-anthropic-key"

# Option 3: OpenRouter (access multiple models)
export EXAAI_LLM="openrouter/auto"
export LLM_API_KEY="your-openrouter-key"
export LLM_API_BASE="https://openrouter.ai/api/v1"

# Option 4: Ollama (local models)
export EXAAI_LLM="ollama/llama3"
export LLM_API_BASE="http://localhost:11434"

# Run your first security assessment (auto-detects modules!)
exaai --target https://your-app.com

[!NOTE] First run automatically pulls the sandbox Docker image. Results are saved to exaai_runs/<run-name>


✨ Features

🛠️ Agentic Security Tools

ExaAiAgent agents come equipped with a comprehensive security testing toolkit:

  • Full HTTP Proxy - Request/response manipulation and analysis
  • Browser Automation - Multi-tab browser for XSS, CSRF, auth flows
  • Terminal Environments - Interactive shells for command execution
  • Python Runtime - Custom exploit development and validation
  • Reconnaissance - Automated OSINT and attack surface mapping
  • Code Analysis - Static and dynamic analysis capabilities
  • API Fuzzing - Advanced REST/GraphQL API testing

🎯 Comprehensive Vulnerability Detection

ExaAiAgent identifies and validates a wide range of security vulnerabilities:

Category Vulnerabilities
Access Control IDOR, privilege escalation, auth bypass
Injection SQL, NoSQL, Command, GraphQL injection
Server-Side SSRF, XXE, deserialization flaws
Client-Side XSS, prototype pollution, DOM vulnerabilities
Business Logic Race conditions, workflow manipulation
Authentication JWT vulnerabilities, OAuth/OIDC flaws, session management
WebSocket CSWSH, message injection, DoS
Infrastructure Subdomain takeover, misconfigurations
WAF Bypass Encoding, smuggling, header manipulation

🕸️ Graph of Agents

Advanced multi-agent orchestration for comprehensive security testing:

  • Distributed Workflows - Specialized agents for different attacks
  • Scalable Testing - Parallel execution for fast coverage
  • Dynamic Coordination - Agents collaborate and share discoveries

💻 Usage Examples

Basic Usage

# Scan a local codebase
exaai --target ./app-directory

# Security review of a GitHub repository
exaai --target https://github.com/org/repo

# Black-box web application assessment
exaai --target https://your-app.com

Smart Auto-Loading (New in v2.0!)

# GraphQL endpoint - auto-loads graphql_security
exaai --target https://api.example.com/graphql

# WebSocket - auto-loads websocket_security
exaai --target wss://chat.example.com/socket

# OAuth endpoint - auto-loads oauth_oidc
exaai --target https://auth.example.com/oauth/authorize

# Subdomain recon - auto-loads subdomain_takeover
exaai --target example.com --instruction "enumerate subdomains"

Advanced Testing Scenarios

# Grey-box authenticated testing
exaai --target https://your-app.com --instruction "Perform authenticated testing using credentials: user:pass"

# Multi-target testing (source code + deployed app)
exaai -t https://github.com/org/app -t https://your-app.com

# With specific modules (overrides auto-detection)
exaai --target https://api.example.com --prompt-modules graphql_security waf_bypass

# Lightweight mode (reduced token consumption)
export EXAAI_LIGHTWEIGHT_MODE=true
exaai --target https://example.com --instruction "quick security scan"

🤖 Headless Mode

Run ExaAiAgent programmatically without interactive UI:

exaai -n --target https://your-app.com

🔄 CI/CD (GitHub Actions)

name: exaai-security-test

on:
  pull_request:

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Install ExaAiAgent
        run: curl -sSL https://raw.githubusercontent.com/hleliofficiel/ExaAiAgent/main/install.sh | bash

      - name: Run ExaAiAgent
        env:
          EXAAI_LLM: ${{ secrets.EXAAI_LLM }}
          LLM_API_KEY: ${{ secrets.LLM_API_KEY }}
        run: exaai -n -t ./

⚙️ Configuration

# Required
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"

# Optional - Performance tuning
export EXAAI_LIGHTWEIGHT_MODE=true    # Reduced token consumption
export EXAAI_MAX_TOKENS=2048          # Max output tokens
export LLM_API_BASE="your-api-base"   # For local models
export PERPLEXITY_API_KEY="key"       # For search capabilities

Recommended Models:

  • OpenAI GPT-5 (openai/gpt-5)
  • Anthropic Claude Sonnet 4.5 (anthropic/claude-sonnet-4-5)
  • Google Gemini 2.0 (gemini/gemini-2.0-flash)

📦 Available Security Modules

Vulnerability Modules

Module Description
sql_injection SQL/NoSQL injection testing
xss Cross-site scripting attacks
ssrf Server-side request forgery
xxe XML external entity attacks
rce Remote code execution
idor Insecure direct object reference
authentication_jwt Auth & JWT vulnerabilities
business_logic Business logic flaws
csrf Cross-site request forgery
race_condition Race condition exploits
graphql_security GraphQL-specific attacks
websocket_security WebSocket vulnerabilities
oauth_oidc OAuth2/OIDC flaws
waf_bypass WAF bypass techniques
subdomain_takeover Subdomain takeover
prompt_injection AI/LLM prompt injection attacks
kubernetes_security NEW! K8s RBAC & Pod Security auditing

🆕 Changelog

v2.1.2 (Latest)

  • AI Agent Integration: OpenClaw/Agent compatibility
  • Stability Fixes: ToolManager thread-safety, Resource cleanup
  • DevEx: New install.sh script, improved logging

v2.1.0

  • New Modules: K8s, Azure, GCP, Prompt Injection
  • React2Shell: CVE-2025-55182 detection
  • Auto-Discovery: Improved target detection

🛠️ Troubleshooting

🔧 Troubleshooting

Problem: "LLM Connection Failed" or Model Not Found

Modern models (like gemini-3-pro-preview) require the latest version of litellm to be recognized correctly.

Solution: Update LiteLLM

pip install -U litellm

Linux/Debian Users (Externally Managed Environment): If you encounter permission errors or "externally-managed-environment", you may need to use a virtual environment (venv) or force a user install:

# Option 1: Virtual Environment (Recommended for Servers)
python3 -m venv venv
source venv/bin/activate
pip install exaai-agent

# Option 2: Force User Install
pip install -U litellm --user --break-system-packages

🤝 Contributing

We welcome contributions! Check out our Contributing Guide.

🌟 Support the Project

Love ExaAiAgent? Give us a ⭐ on GitHub!

🙏 Acknowledgements

ExaAiAgent builds on incredible open-source projects like LiteLLM, Caido, ProjectDiscovery, Playwright, and Textual.

[!WARNING] Only test apps you own or have permission to test. You are responsible for using ExaAiAgent ethically and legally.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

exaai_agent-2.2.0.tar.gz (331.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

exaai_agent-2.2.0-py3-none-any.whl (403.2 kB view details)

Uploaded Python 3

File details

Details for the file exaai_agent-2.2.0.tar.gz.

File metadata

  • Download URL: exaai_agent-2.2.0.tar.gz
  • Upload date:
  • Size: 331.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for exaai_agent-2.2.0.tar.gz
Algorithm Hash digest
SHA256 05120cade3d4e726165cd2352dab7bec91b600995d5d853f5bc1da6d1e13473a
MD5 8fa9bf3e211476fe674d6bc81e9c02a0
BLAKE2b-256 48d81a3dca5ca8fe98ee3e932978cb60c1e1b7b47a2c1ee954d9eeedab9992b7

See more details on using hashes here.

Provenance

The following attestation bundles were made for exaai_agent-2.2.0.tar.gz:

Publisher: publish.yml on hleliofficiel/ExaAiAgent

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file exaai_agent-2.2.0-py3-none-any.whl.

File metadata

  • Download URL: exaai_agent-2.2.0-py3-none-any.whl
  • Upload date:
  • Size: 403.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for exaai_agent-2.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5ef677f6ec5c358df42aea80e2fc7a1053b7b218b01774e459007d34875940e1
MD5 3601140f9d4241cd6fa886ee8d5e1088
BLAKE2b-256 e50aa6bb47020bd6abb22c42c86553cb751230f11a0daa78dd034cf85b776c3f

See more details on using hashes here.

Provenance

The following attestation bundles were made for exaai_agent-2.2.0-py3-none-any.whl:

Publisher: publish.yml on hleliofficiel/ExaAiAgent

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page