What is the point of that exploit?!
Exploint is a Go CLI tool that automates vulnerability exploitability analysis with AI-powered enrichment. It analyzes Go codebases and container images to determine if vulnerabilities are exploitable in the specific context, with LLM integration for latest CVE information and interactive Q&A capabilities.
- 🔍 Vulnerability Scanning: Optional Trivy integration for scanning filesystems and container images
- 📦 Manual CVE Input: Support for JSON/YAML/CSV input or command-line CVE lists
- 🤖 AI-Powered Analysis: LLM integration for CVE enrichment and context-aware exploitability assessment
- 🔬 Code Analysis: Go AST parsing to identify component usage and execution paths
- 🐳 Container Analysis: Dockerfile parsing and image inspection
- 💬 Interactive Q&A: Chat interface for querying analysis results
- 📊 Rich Reports: Markdown reports with VEX (CycloneDX) generation
git clone https://github.com/matanlivne/exploint.git
cd exploint
go build -o exploint cmd/exploint/main.go# Build the image
docker build -t exploint:latest -f docker/Dockerfile .
# Run analysis
docker run --rm \
-v $(pwd):/workspace \
-e EXPLOINT_LLM_API_KEY=$OPENAI_API_KEY \
exploint:latest analyze \
--repo /workspace \
--scan \
--output /workspace/report.md
# Interactive chat
docker run -it --rm \
-v $(pwd):/workspace \
-e EXPLOINT_LLM_API_KEY=$OPENAI_API_KEY \
exploint:latest chat \
--results /workspace/results.json \
--interactiveCreate a .env file or set environment variables:
export EXPLOINT_LLM_API_KEY=your-api-key-here
export EXPLOINT_LLM_PROVIDER=openaiCreate ~/.exploint/config.yaml:
llm:
provider: openai
api_key: your-api-key-here
enabled: trueexploint analyze \
--repo /path/to/go/project \
--scan \
--output report.md \
--format mdexploint analyze \
--image myapp:latest \
--scan \
--output report.mdexploint analyze \
--repo /path/to/go/project \
--cves CVE-2025-47273,CVE-2025-0913 \
--output report.mdexploint chat \
--results report.json \
--interactiveexploint/
├── cmd/
│ └── exploint/ # Main CLI entry point
├── pkg/
│ ├── analyzer/ # Code and image analysis
│ ├── assessor/ # Exploitability assessment
│ ├── scanner/ # Trivy and manual CVE input
│ ├── llm/ # LLM integration
│ ├── chat/ # Interactive Q&A
│ ├── reporter/ # Report generation
│ ├── models/ # Data models
│ └── config/ # Configuration management
└── docker/
└── Dockerfile
Exploint includes an MCP (Model Context Protocol) server that allows you to use Exploint directly from Cursor IDE with Cursor's built-in LLM capabilities.
See Exploint-mcp/README.md for installation and configuration instructions.
-
Build the MCP server:
cd cmd/exploint-mcp go build -o exploint-mcp main.go -
Configure in Cursor IDE using the example config in
Exploint-mcp/cursor-mcp-config.json -
Use Exploint tools in Cursor:
@exploint analyze_repository path=/path/to/repo
[License TBD]