Skip to main content

Security scanner for AI agent workflows - find vulnerabilities in LangChain, CrewAI, and other agent frameworks

Project description

igris

Security scanner for AI agent workflows.

Find vulnerabilities in LangChain, CrewAI, OpenAI Agents SDK, and other AI agent frameworks before attackers do.

PyPI License: MIT

What It Does

igris connects to running AI agents and tests them for security vulnerabilities:

  • Prompt Injection — Can attackers override the agent's instructions?
  • System Prompt Extraction — Can attackers leak the agent's configuration?
  • Jailbreaks — Can attackers bypass safety guardrails?
  • Tool Abuse — Can attackers make the agent misuse its tools?
  • Multi-Turn Escalation — Can attackers manipulate the agent over conversation?

Quick Start

# Install
pip install igris

# Scan an agent
igris scan --http http://localhost:8000/chat

# Map agent capabilities
igris map --http http://localhost:8000/chat

Example Output

🔒 Scan Starting
Target: http://localhost:8000/chat
✓ Connected successfully

Discovering agent capabilities...
File Access:      ✓
Code Execution:   ✓
Web Access:       ✗
Memory:           ✓

Running security scans...

🚨 Found 4 Vulnerabilities
Critical: 1  High: 2  Medium: 1  Low: 0

┏━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━┓
┃ Severity ┃ Title                    ┃ Category         ┃ Confidence ┃
┡━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━╇━━━━━━━━━━━━┩
│ CRITICAL │ Dangerous Tool Execution │ tool_abuse       │ confirmed  │
│ HIGH     │ System Prompt Extraction │ prompt_injection │ likely     │
│ HIGH     │ Multi-Turn Escalation    │ multi_turn       │ confirmed  │
│ MEDIUM   │ Potential Override       │ prompt_injection │ possible   │
└──────────┴──────────────────────────┴──────────────────┴────────────┘

Installation

pip install igris

Or with AI-powered analysis:

pip install igris[ai]

Usage

Scan an Agent

# Basic scan
igris scan --http http://localhost:8000/chat

# With authentication
igris scan --http https://api.example.com/agent --auth "Bearer sk-xxx"

# Save report
igris scan --http http://localhost:8000/chat --output report.json

# Verbose output
igris scan --http http://localhost:8000/chat --verbose

Map Agent Architecture

# Discover what the agent can do
igris map --http http://localhost:8000/chat

Supported Frameworks

igris works with any AI agent that exposes an HTTP endpoint:

  • ✅ LangChain / LangGraph
  • ✅ CrewAI
  • ✅ OpenAI Agents SDK
  • ✅ AutoGen
  • ✅ Custom agents

Why igris?

Traditional security tools test code. igris tests behavior.

AI agents make decisions at runtime. They interpret instructions, choose tools, and act on user input. Static analysis can't find these bugs — you need to actually talk to the agent and see what it does.

igris does exactly that: sends adversarial inputs, observes agent behavior, and reports when the agent does something dangerous.

From the Creator of mcpsec

igris is built by the creator of mcpsec, which found CVSS 10.0 vulnerabilities in Microsoft and AWS MCP implementations.

Same approach, one layer up: mcpsec tests MCP servers (the transport layer), igris tests agent workflows (the orchestration layer).

License

MIT

Author

Manthan Ghasadiya

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

igris-0.2.1.tar.gz (25.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

igris-0.2.1-py3-none-any.whl (30.3 kB view details)

Uploaded Python 3

File details

Details for the file igris-0.2.1.tar.gz.

File metadata

  • Download URL: igris-0.2.1.tar.gz
  • Upload date:
  • Size: 25.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for igris-0.2.1.tar.gz
Algorithm Hash digest
SHA256 ecaea6e1a62a5e9536276078590d1ac8d8a6c55a057fb9a8ce6610bf366a06f9
MD5 b38726c9044e530fc64ba1b49951deca
BLAKE2b-256 e4539572b1bfd6472703e7f43961b7e4a64892edff927109d9eb754eb6ecaf0d

See more details on using hashes here.

File details

Details for the file igris-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: igris-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 30.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for igris-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 d822c1c11b121dd772afeeeffa4adf5a3d08fe4dbc8df1aef407807ebb9fac62
MD5 e6a7f43513ef91cdadd5f12a612411ce
BLAKE2b-256 f22c2ab7b48cd1f8282a8715674d2a5261234b2785e8614b5647c2d756e50f26

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page