Skip to content

go-appsec/sectool-agents

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

go-appsec/sectool-agents

license Tests - Main Push

Agents that drive sectool in autonomous security workflows. Each agent runs a multi-agent loop (workers + verifier + director) on top of sectool's MCP server so an LLM can autonomously explore a target for vulnerabilities, reproduce candidates, and file findings.

This repo is a home for multiple agent implementations. They all share the same agent contract (worker reports candidates, verifier reproduces and files, director plans the next iteration) — what differs is which SDK / model backend the agent runs on and which language it's written in.

Prerequisites

Every agent in this repo drives the sectool MCP API, which lives in the go-appsec/toolbox repo and must be installed independently:

go install github.com/go-appsec/toolbox/sectool@latest

This places the sectool binary on your GOBIN (typically $GOPATH/bin or ~/go/bin). Make sure that directory is on your PATH, or pass the binary path to the agent via its own flag — see each agent's README.

See the individual agent READMEs for any additional language / runtime prerequisites.

Available agents

Agent Language Backend Auth
claude-controller/ Python Claude Agent SDK Claude Code OAuth (uses your claude CLI session)

Vibe-Scale 4.0(V2|U2|T1): Vibed code with gaps

A Python controller built on the Claude Agent SDK. Workers run as Claude Code instances connected to sectool's MCP server; the verifier and director are separate Claude instances with phase-gated tool surfaces and their own system prompts.

Use claude-controller if:

  • You already pay for a Claude subscription via Claude Code and want to bill autonomous security exploration to that quota directly, without managing a separate API key.
  • You want the sharpest currently-available Claude models as workers and orchestrators with zero extra provider setup.

See claude-controller/README.md for installation, flag reference, phase mechanics, and test instructions.

Shared architecture

  • Workers call sectool MCP tools (proxy, replay, crawl, OAST, diff/reflection, encoders) plus a report_finding_candidate tool.
  • Verifier is a separate agent with the full sectool tool surface whose only job is to independently reproduce candidates, then call file_finding or dismiss_candidate.
  • Director is a separate agent whose only job is to decide what each worker does next: continue_worker, expand_worker, stop_worker, plan_workers, or done. It also sets each worker's per-iteration autonomous_budget.
  • The outer loop runs autonomous worker turns → verification → direction per iteration, with phase-gated tools so each role stays in lane.
  • Findings are deduplicated and written as markdown files with a Verification section in the configured findings directory.

Where findings land

Every agent writes to its --findings-dir (default ./findings/) as finding-NN-<slug>.md files containing Title, Severity, Affected Endpoint, Description, Reproduction Steps, Evidence, Impact, and a Verification section sourced from the verifier's reproduction notes.

About

Agents which use the go-appsec/toolbox in autonomous security workflows

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages