You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OpenSecCLI unifies 84 security commands across 20 providers and 11 domains into a single CLI. Query threat intel, scan for vulnerabilities, pentest APIs, audit cloud infrastructure, assess agent security -- all with consistent JSON output and pipe-friendly design.
Built for security professionals who want one tool instead of twenty. Built for AI agents that need structured output and predictable error handling.
npm install -g openseccli
Quick Demo
# Multi-source threat intel -- queries 5 APIs in parallel, returns consensus verdict
$ opensec enrichment ip-enrich 203.0.113.5
Source Status Verdict Detail
AbuseIPDB ok Malicious abuse_score: 100, country: DE, total_reports: 847
VirusTotal ok Malicious malicious: 12, as_owner: Hetzner
GreyNoise ok Malicious classification: malicious, noise: true
ipinfo ok - country: DE, org: Hetzner, city: Falkenstein
ThreatFox ok Known IOC threat_type: botnet_cc, malware: Cobalt Strike
# Full security header audit with A-F grading (zero external deps)
$ opensec vuln header-audit --url https://example.com
# Fuzz parameters with built-in XSS/SQLi/traversal payloads
$ opensec pentest fuzz --url "https://target.com/search?q=test" --payloads xss
# Scan MCP server tools for prompt injection & rug-pull risks
$ opensec agent-security mcp-audit ./mcp-config.json
# CVE lookup -- no API key needed
$ opensec nvd cve-get CVE-2024-3094
┌───────────────┬────────────┬──────────┬──────────┬─────────────────────┬──────────────────────────────────────┐
│ cve_id │ cvss_score │ severity │ status │ published │ description │
├───────────────┼────────────┼──────────┼──────────┼─────────────────────┼──────────────────────────────────────┤
│ CVE-2024-3094 │ 10 │ CRITICAL │ Modified │ 2024-03-29T17:15:21 │ Malicious code was discovered in ... │
└───────────────┴────────────┴──────────┴──────────┴─────────────────────┴──────────────────────────────────────┘
Why OpenSecCLI?
Without OpenSecCLI
With OpenSecCLI
Threat Intel
5 different APIs, 5 different auth flows, 5 output formats
opensec enrichment ip-enrich <ip>
Vuln Scanning
Install nuclei + nikto + testssl + custom scripts
opensec vuln nuclei-scan <target>
Agent Security
No standard tooling exists
opensec agent-security mcp-audit <path>
Output
Parse each tool differently
--format json|csv|yaml|table|markdown everywhere
Automation
Glue scripts between tools
Pipe stdin/stdout, JSON errors, exit 0 for empty results
Install
npm (recommended)
npm install -g openseccli
opensec --help
Docker
# Lite (~200 MB) -- pure-TS adapters, no external tools needed
docker build -t opensec .
docker run -it opensec vuln header-audit --url https://example.com
# Full (~3 GB) -- includes nuclei, subfinder, semgrep, trivy, and 40+ tools
docker build -t opensec-full --target full .
docker run -it opensec-full vuln nuclei-scan https://target.com
From Source
git clone https://github.com/user/OpenSecCLI.git
cd OpenSecCLI
npm install
npm run build
node dist/main.js --help
Commands at a Glance
84 commands organized across 11 security domains. 10 commands run with zero external dependencies (pure TypeScript).
Threat Intelligence -- 8 commands (no API key needed)
pure TS -- identify hash type + hashcat/john format
DAST (1 command)
Command
Backend
opensec dast zap-scan <target>
OWASP ZAP
Claude Code Skills (30)
OpenSecCLI ships 30 AI-powered security workflows as Claude Code slash commands. Each skill orchestrates multiple opensec commands into complete investigation or pentest workflows.
For more complex integrations, write a TypeScript adapter. See CONTRIBUTING.md.
Plugin system: Third-party adapters can be installed to ~/.openseccli/plugins/ via opensec plugin install github:user/repo.
APIs Waiting for Adapters
urlscan.io, Censys, SecurityTrails, Pulsedive, PhishTank, Hybrid Analysis, AlienVault OTX, EmailRep.io, IBM X-Force, Hunter.io, CIRCL hashlookup, MaxMind GeoLite2, Tor Exit Node List -- see Issues.
Autopilot — One Command Does Everything
$ opensec autopilot https://target.com
═══════════════════════════════════════════
OpenSecCLI Autopilot Report
═══════════════════════════════════════════
Target: https://target.com
Grade: C (54/100)
Findings: 43 total (2 Critical, 8 High)
Duration: 18.2s
═══════════════════════════════════════════
$ opensec report opensec-report/autopilot-report.json
# → Generates professional HTML report
MCP Server — AI Agent Integration
# Add to Claude Desktop / Cursor MCP config:
{
"mcpServers": {
"opensec": {
"command": "npx",
"args": ["openseccli", "mcp"]
}
}
}
# Now any AI agent can call 84 security commands as tools
Dual adapter system: YAML for simple API wrappers (one file, no code), TypeScript for complex logic (parsers, multi-step workflows, pure-TS scanners). Both register identically into the command tree.