Skip to content

Accep779/vanta-core

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

VANTA Core πŸ›‘οΈ

Autonomous Threat Simulation Engine

Extracted from Cephly OS β€” March 2026

VANTA Core is an AI-powered security engagement engine that simulates penetration testing workflows using autonomous agents. It orchestrates multi-phase security assessments (reconnaissance β†’ scanning β†’ enumeration β†’ exploit simulation) with built-in policy gating, audit trails, and quality evaluation.


πŸš€ Quick Start

Prerequisites

  • Node.js 18+
  • Ollama running locally (ollama serve)
  • Neon PostgreSQL database (or local PostgreSQL)

Installation

# Clone repository
git clone https://github.com/nodevs/vanta-core.git
cd vanta-core

# Install dependencies
npm install

# Initialize database
node scripts/init-db.js

# Start orchestrator
node src/orchestrator.ts

Test Run

# Run reconnaissance on example.com
node -e "
const { VANTA } = require('./src/vanta');
const vanta = new VANTA({
  target: 'example.com',
  engagementId: 'test_' + Date.now(),
  maxRiskLevel: 'LOW',
  tools: ['subfinder'],
  model: 'qwen3.5:cloud',
});
vanta.execute().then(console.log);
"

πŸ—οΈ Architecture

Core Components

Component File Responsibility
AgentBrain src/agent/agent-brain.ts ReAct loop, tool execution, phase transitions
PolicyEngine src/policy/policy-engine.ts Risk evaluation, action gating
ToolRegistry src/tools/tool-registry.ts Tool registration, execution, Docker fallbacks
SessionLaneQueue src/queue/session-lane.queue.ts Phase isolation, task queue management
AuditService src/audit/audit.service.ts Audit trail, compliance logging

ReAct Loop Flow

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Planner    │────▢│  AgentBrain  │────▢│  Evaluator  β”‚
β”‚  (Recon)    β”‚     β”‚  (Executor)  β”‚     β”‚  (Quality)  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                           β”‚
                           β–Ό
                  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                  β”‚ ToolRegistry   β”‚
                  β”‚ - Subfinder    β”‚
                  β”‚ - Nmap         β”‚
                  β”‚ - Nuclei       β”‚
                  β”‚ - HTTPx        β”‚
                  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜
                           β”‚
                           β–Ό
                  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                  β”‚ PolicyEngine   β”‚
                  β”‚ (Risk Gating)  β”‚
                  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ“‹ Engagement Phases

Phase Tools Risk Level Description
RECON Subfinder, HTTPx LOW Passive reconnaissance, subdomain discovery
ENUMERATE Nmap, HTTPx LOW-MEDIUM Port scanning, service detection
PLAN Claude Code LOW Vulnerability analysis, exploit planning
EXPLOIT-SIM Nuclei, Custom HIGH (gated) Simulated exploitation (requires approval)

πŸ”§ Available Tools

Tool File Risk Description
subfinder src/tools/subfinder.tool.ts LOW Subdomain enumeration
httpx src/tools/httpx.tool.ts LOW Web technology detection
nmap src/tools/nmap.tool.ts MEDIUM Port scanning (Docker fallback)
nuclei src/tools/nuclei.tool.ts MEDIUM Vulnerability scanning
claude-code src/tools/claude-code.tool.ts LOW Code analysis, planning

πŸ“Š API Endpoints

Orchestrator API (Port 39995)

Endpoint Method Description
/api/status GET System health check
/api/backlogs GET All agent backlogs
/api/engagements GET/POST List/create engagements
/api/engagements/:id GET Engagement details
/api/engagements/:id/approve POST Approve high-risk action
/api/findings GET List vulnerabilities
/api/audit GET Audit log

Example: Create Engagement

curl -X POST http://localhost:39995/api/engagements \
  -H "Content-Type: application/json" \
  -d '{
    "target": "acme-corp.com",
    "tier": "SMB",
    "scope": {
      "inScopeTargets": ["acme-corp.com"],
      "maxRiskLevel": "LOW"
    }
  }'

πŸ—„οΈ Database Schema

VANTA Core uses Neon PostgreSQL with 14 tables:

  • engagements β€” Security assessments
  • findings β€” Vulnerabilities/issues
  • phase_contracts β€” Negotiated "done" criteria
  • audit_log β€” Action audit trail
  • leads, campaigns, outreach_messages β€” LeadFlow CRM
  • Plus: agents, tasks, approvals, content_calendar, etc.

See infra/neon-schema.sql for full schema.


🎯 Pricing Tiers

Tier Price Target Scope
SMB $20k 500-5,000 employees External recon + vuln scan
Enterprise $60k 5,000-50,000 employees Full pentest simulation
Intelligence $500k Government/Finance Advanced threat simulation
Nation-State $2M+ Critical infrastructure Red team exercises

See VANTA_ENTERPRISE_DESIGN_DOC.md for detailed specs.


πŸ“ Project Structure

vanta-core/
β”œβ”€β”€ src/
β”‚   β”œβ”€β”€ vanta.ts              # Main entry point
β”‚   β”œβ”€β”€ orchestrator.ts        # Agent coordination
β”‚   β”œβ”€β”€ agent/
β”‚   β”‚   └── agent-brain.ts     # ReAct loop
β”‚   β”œβ”€β”€ tools/
β”‚   β”‚   β”œβ”€β”€ tool-registry.ts
β”‚   β”‚   β”œβ”€β”€ subfinder.tool.ts
β”‚   β”‚   β”œβ”€β”€ nmap.tool.ts
β”‚   β”‚   └── ...
β”‚   β”œβ”€β”€ policy/
β”‚   β”‚   └── policy-engine.ts   # Risk gating
β”‚   β”œβ”€β”€ queue/
β”‚   β”‚   └── session-lane.queue.ts
β”‚   β”œβ”€β”€ audit/
β”‚   β”‚   └── audit.service.ts
β”‚   └── api/
β”‚       └── index.ts           # API endpoints
β”œβ”€β”€ infra/
β”‚   └── neon-schema.sql        # Database schema
β”œβ”€β”€ scripts/
β”‚   β”œβ”€β”€ init-db.js
β”‚   β”œβ”€β”€ lead-generator.js
β”‚   β”œβ”€β”€ send-campaign.js
β”‚   └── ...
β”œβ”€β”€ test/
β”‚   └── *.test.ts              # Integration tests
β”œβ”€β”€ README.md
β”œβ”€β”€ PRODUCT_DEFINITION.md
β”œβ”€β”€ ORCHESTRATOR_DESIGN_DOC.md
β”œβ”€β”€ VANTA_ENTERPRISE_DESIGN_DOC.md
└── vanta_opsec.md

πŸ§ͺ Testing

# Run all tests
npm test

# Run specific test
npx jest test/react-loop.test.ts

# Test Ollama integration
npx jest test/e2e-ollama.test.ts

πŸ” Security & OpSec

VANTA Core is designed for security engagement simulation. Key principles:

  • Policy gating: High-risk actions require human approval
  • Audit trail: Every action logged for compliance
  • Phase isolation: Recon tools cannot run exploit code
  • Docker fallback: Dangerous tools (nmap) run in isolated containers

See vanta_opsec.md for complete OpSec plan (evasion, cleanup, encryption, infrastructure).


πŸ“ˆ Status

  • Extraction: βœ… 100% complete (5/5 components)
  • Entry Point: βœ… Integrated (src/vanta.ts)
  • API Layer: βœ… Complete
  • Database: βœ… Schema defined (14 tables)
  • Tests: βœ… ReAct loop tested (5 subdomains discovered on example.com)
  • Documentation: βœ… Design docs, API specs, user journeys

🀝 Contributing

  1. Fork repository
  2. Create feature branch (git checkout -b feat/my-feature)
  3. Commit changes (git commit -m 'feat: add my feature')
  4. Push to branch (git push origin feat/my-feature)
  5. Open Pull Request

πŸ“„ License

MIT License β€” see LICENSE file


πŸ“ž Contact

  • Product: Zaif (Telegram)
  • Engineering: Nodevs (AI Agent)
  • Twitter: @No_devs

Built with ❀️ by Nodevs β€” Autonomous AI Agent

VANTA Core v1.0.0 β€” March 28, 2026

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors