Skip to main content

AI-powered SAST + DAST security scanner for bug bounty hunters

Project description

Senshi (戦士)

AI-powered SAST + DAST security scanner for bug bounty hunters

PyPI License Python LLM Providers


Senshi uses LLMs to generate context-aware payloads, analyze responses intelligently, eliminate false positives, and chain findings into exploitable attack paths — all from a single CLI.

Created by Manthan Ghasadiya — creator of mcpsec (4 CVEs including CVSS 10.0) and igris.

Why Senshi?

Traditional scanners fire generic payloads and drown you in false positives. Senshi is different:

  • 🧠 AI-First — LLMs generate payloads tailored to the target's tech stack and context
  • 🚫 FP Elimination — A skeptical 2nd-pass AI reviewer slashes false positives
  • 🔗 Chain Builder — Links individual findings into high-impact exploit chains
  • 📋 Bounty Reports — LLM writes your HackerOne/MSRC submission for you
  • 🔌 Provider Agnostic — DeepSeek, OpenAI, Groq, Ollama, Anthropic — your choice

Features

Feature Description
Autonomous Pentesting Think \u2192 Act \u2192 Observe LLM agent loop with browser execution
DAST Crawl, probe, inject, and analyze live endpoints
SAST Deep source code analysis with multi-language support
10+ DAST Scanners XSS, SSRF, IDOR, SQLi, CMDi, SSTI, Open Redirect, Auth bypass, Deserialization, Info Disclosure
5 SAST Scanners Injection, Auth, Crypto, Config, AI pattern detection
Auto-Recon Endpoint discovery, JS analysis, tech fingerprinting
Browser Recon & Testing Headless Chromium captures traffic and confirms vulnerabilities via Playwright
Smart Routing Scanners only run on relevant endpoints (~2x speedup)
Batch Analysis 1 LLM call per endpoint per scanner (~6x fewer API calls)
Progressive Save Results saved to disk as found \u2014 Ctrl+C preserves findings
4 Output Formats JSON, Markdown, SARIF (CI/CD), Bounty Report

Installation

pip install senshi

Or from source:

git clone https://github.com/manthanghasadiya/senshi.git
cd senshi
pip install -e ".[dev,browser,websocket]"

Quick Start

1. Set your API key

export DEEPSEEK_API_KEY="sk-..."
# or: export OPENAI_API_KEY="sk-..."
# or: export GROQ_API_KEY="gsk_..."

2. Scan

# Autonomous Black-Box Pentest (v0.5.0)
senshi pentest https://target.com --provider deepseek --browser --verbose

# DAST \u2014 scan live targets
senshi dast https://target.com --provider deepseek

# With auth + Burp proxy
senshi dast https://target.com/api \
  --auth "Cookie: session=abc" \
  --proxy http://127.0.0.1:8080

# Specific scanners only
senshi dast https://target.com --modules xss,ssrf,injection

# SAST — analyze source code
senshi sast ./my-project
senshi sast https://github.com/user/repo.git

# Recon only
senshi recon https://target.com --depth 3

# Browser-based recon (captures XHR/fetch traffic)
senshi recon https://target.com --browser --output endpoints.json

# DAST with pre-discovered endpoints
senshi dast https://target.com --endpoints endpoints.json

# Generate payloads
senshi payloads --vuln xss --target "POST /api/chat" --param message

# Generate bounty report from findings
senshi report findings.json --platform hackerone --output report.md

CLI Reference

Command Description
senshi pentest <url> Run autonomous pentest agent
senshi dast <url> Scan live web endpoints
senshi sast <path> Analyze source code (dir, git URL, or zip)
senshi recon <url> Discover endpoints (no scanning)
senshi payloads Generate payloads for manual testing
senshi report <file> Generate bounty report from findings JSON
senshi config Configure API keys and settings
Scanner Vulnerability Types
ssti Template injection (Jinja, Twig, etc.)
deserialization Insecure object handling (Java, PHP, Python)
cmdi OS Command Injection (Unix/Windows)
sqli SQL Injection (Error, Boolean, Blind)
xss Reflected, context-aware payload testing
ssrf Cloud metadata & OOB callbacks
idor Parameter manipulation & resource enumeration
auth Missing auth on sensitive endpoints
open_redirect Unvalidated external redirections
info_disclosure Regex-based secret detection

SAST Scanners

Scanner Focus
Injection SQLi, command injection, SSRF, path traversal in code
Auth Hardcoded creds, missing auth checks, broken access control
Crypto Weak hashing (MD5/SHA1), hardcoded keys, insecure random
Config Debug mode, CORS misconfiguration, missing security headers
AI Prompt injection sinks, unsafe eval of LLM output

Output Formats

  • JSON — Machine-readable, re-importable with senshi report
  • Markdown — Human-readable with severity indicators and evidence blocks
  • SARIF — CI/CD integration (GitHub Code Scanning, Azure DevOps)
  • Bounty Report — LLM-written submission tailored to your platform

Supported LLM Providers

Provider Environment Variable Default Model
DeepSeek DEEPSEEK_API_KEY deepseek-chat
OpenAI OPENAI_API_KEY gpt-4o-mini
Groq GROQ_API_KEY llama-3.3-70b-versatile
Ollama — (local) llama3.1
Anthropic ANTHROPIC_API_KEY claude-3.5-sonnet

Architecture

Architecture

Senshi operates on an autonomous Think \u2192 Act \u2192 Observe loop, building context across iterations:

graph TD
    Start([senshi pentest]) --> Recon[Automated Recon]
    Recon --> Loop
    
    subgraph Agent Loop
    Loop((Pentest Context)) --> Think[AgentPlanner: Decide Next Action]
    Think --> Act[ActionExecutor]
    Act --> Scanners[DAST Scanners]
    Act --> Browser[Browser Exploiter]
    Act --> Custom[IDOR / WS / Auth]
    Scanners --> Observe[Analyze & Update Context]
    Browser --> Observe
    Custom --> Observe
    Observe --> Loop
    end
    
    Think -->|Task Complete| PoC[PoC Generation]
    PoC --> Report([Final Report & Chains])

Development

git clone https://github.com/manthanghasadiya/senshi.git
cd senshi
pip install -e ".[dev]"

# For browser recon support
pip install -e ".[browser]"
playwright install chromium

pytest tests/ -v

See CONTRIBUTING.md for details.

Legal

[!CAUTION] Senshi is intended for authorized security testing only. Only scan targets you have explicit written permission to test. Unauthorized scanning is illegal. See SECURITY.md.

License

MIT License — see LICENSE for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

senshi-0.6.0.tar.gz (147.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

senshi-0.6.0-py3-none-any.whl (195.1 kB view details)

Uploaded Python 3

File details

Details for the file senshi-0.6.0.tar.gz.

File metadata

  • Download URL: senshi-0.6.0.tar.gz
  • Upload date:
  • Size: 147.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for senshi-0.6.0.tar.gz
Algorithm Hash digest
SHA256 a383e5fb09f6989ea0987aa709ce02f51a7f3d8e542b04abe3a681b7d68eeb68
MD5 11890e6069d598fe7f10c05acacb2d44
BLAKE2b-256 dcf7e937e1304b2deaf48bf00267e13ed1622d7b83dc38b40d92a21908386271

See more details on using hashes here.

File details

Details for the file senshi-0.6.0-py3-none-any.whl.

File metadata

  • Download URL: senshi-0.6.0-py3-none-any.whl
  • Upload date:
  • Size: 195.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for senshi-0.6.0-py3-none-any.whl
Algorithm Hash digest
SHA256 dd5f5097354c04a194fea48e5a873bc60b946bc691fb7fef0f9f196921db6e80
MD5 524d15d135a9fce6ca686f8e9b337f5c
BLAKE2b-256 07bb52ac758aabd2a8465f541be4c5dc3265beb6fdbbed3b8b0cd1f382b01e55

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page