Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 7 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,13 @@ This repository contains a collection of specialized, autonomous AI agents desig

The following table provides a high-level overview and comparison of the agents available in this collection.

| Agent | Description | Primary Use Case | Environment | Input Method | Key Tools |
| :------------------- | :--------------------------------------------------------------------------------------------- | :----------------------------------------------------------------- | :------------------------ | :---------------------------------------------------------- | :------------------------------ |
| **Dotnet Reversing** | Reverses and analyzes .NET binaries for vulnerabilities using an LLM. | Security analysis of .NET applications. | Python | Local .NET DLL/EXE files or NuGet package IDs. | `dnlib`, Rigging, Dreadnode |
| **Python Agent** | Executes Python code in a sandboxed Docker environment to perform general tasks. | General-purpose code execution, data analysis, automation. | Python, Docker | Natural language task, Docker image, volume mounts. | Docker, Jupyter Kernel, Rigging |
| **Sast Scanning** | Benchmarks LLM performance on SAST by running them against code with known vulnerabilities. | Evaluating and comparing LLMs for security code review. | Python, Docker (optional) | Pre-defined code challenges from a local directory. | Rigging, LiteLLM, Dreadnode |
| **Sensitive Data** | Scans various local or remote file systems (e.g., local, S3, GitHub) for sensitive data leaks. | Data governance and security auditing for exposed credentials/PII. | Python, `fsspec` | `fsspec`-compatible URI (e.g., `s3://...`, `github://...`). | `fsspec`, Rigging, Dreadnode |
| Agent | Description | Primary Use Case | Environment | Input Method | Key Tools |
| :------------------------- | :--------------------------------------------------------------------------------------------- | :----------------------------------------------------------------- | :------------------------ | :---------------------------------------------------------- | :------------------------------ |
| **Dangerous Capabilities** | Automatically build and run Capture The Flag (CTF) challenges | Reproduce Google's "Dangerous Capabilities" evaluation | Python | A selected challenge container | Kali, Rigging, Dreadnode |
| **Dotnet Reversing** | Reverses and analyzes .NET binaries for vulnerabilities using an LLM. | Security analysis of .NET applications. | Python | Local .NET DLL/EXE files or NuGet package IDs. | `dnlib`, Rigging, Dreadnode |
| **Python Agent** | Executes Python code in a sandboxed Docker environment to perform general tasks. | General-purpose code execution, data analysis, automation. | Python, Docker | Natural language task, Docker image, volume mounts. | Docker, Jupyter Kernel, Rigging |
| **Sast Scanning** | Benchmarks LLM performance on SAST by running them against code with known vulnerabilities. | Evaluating and comparing LLMs for security code review. | Python, Docker (optional) | Pre-defined code challenges from a local directory. | Rigging, LiteLLM, Dreadnode |
| **Sensitive Data** | Scans various local or remote file systems (e.g., local, S3, GitHub) for sensitive data leaks. | Data governance and security auditing for exposed credentials/PII. | Python, `fsspec` | `fsspec`-compatible URI (e.g., `s3://...`, `github://...`). | `fsspec`, Rigging, Dreadnode |

---

Expand Down