> cat /dev/github | grep security-tools
discovered 30 Mar 2026

guardian-cli

Python โ˜… 1317 via github-topic
โ†’ View on GitHub

AI Summary: Guardian is an AI-powered penetration testing automation platform designed for enterprise environments, integrating multiple AI providers with extensive security tools to perform intelligent and adaptive security assessments. It features a multi-agent architecture for strategic decision-making, 19 integrated security tools for thorough testing, and enhanced evidence capture for complete traceability of findings. Users must ensure authorized access before conducting tests, adhering to legal and ethical guidelines.


README

Guardian Logo

๐Ÿ” Guardian

AI-Powered Penetration Testing Automation Platform

License: MIT Python 3.11+ Code style: black

Guardian is an enterprise-grade AI-powered penetration testing automation framework that combines multiple AI providers (OpenAI GPT-4, Claude, Google Gemini, OpenRouter) with battle-tested security tools to deliver intelligent, adaptive security assessments with comprehensive evidence capture.

Features โ€ข Installation โ€ข Quick Start โ€ข Documentation โ€ข Contributing


Guardian is designed exclusively for authorized security testing and educational purposes.

  • โœ… Legal Use: Authorized penetration testing, security research, educational environments
  • โŒ Illegal Use: Unauthorized access, malicious activities, any form of cyber attack

You are fully responsible for ensuring you have explicit written permission before testing any system. Unauthorized access to computer systems is illegal under laws including the Computer Fraud and Abuse Act (CFAA), GDPR, and equivalent international legislation.

By using Guardian, you agree to use it only on systems you own or have explicit authorization to test.


โœจ Features

๐Ÿค– Multi-Provider AI Intelligence

  • 4 AI Providers Supported: OpenAI (GPT-4o), Anthropic (Claude), Google (Gemini), OpenRouter
  • Flexible Provider Selection: Switch between providers via config or command-line
  • Multi-Agent Architecture: Specialized AI agents (Planner, Tool Selector, Analyst, Reporter) collaborate for comprehensive security assessments
  • Strategic Decision Making: AI analyzes findings and determines optimal next steps
  • Adaptive Testing: AI adjusts tactics based on discovered vulnerabilities and system responses
  • False Positive Filtering: Intelligent analysis reduces noise and focuses on real vulnerabilities

๐Ÿ› ๏ธ Extensive Tool Arsenal

19 Integrated Security Tools:

  • Network: Nmap (comprehensive scanning), Masscan (ultra-fast scanning)
  • Web Reconnaissance: httpx (HTTP probing), WhatWeb (tech fingerprinting), Wafw00f (WAF detection)
  • Subdomain Discovery: Subfinder (passive enumeration), Amass (active/passive mapping), DNSRecon (DNS analysis)
  • Vulnerability Scanning: Nuclei (template-based), Nikto (web vulnerabilities), SQLMap (SQL injection), WPScan (WordPress)
  • SSL/TLS Testing: TestSSL (cipher analysis), SSLyze (advanced configuration)
  • Content Discovery: Gobuster (directory brute forcing), FFuf (advanced web fuzzing), Arjun (parameter discovery)
  • Security Analysis: XSStrike (XSS detection), GitLeaks (secret scanning), CMSeeK (CMS detection)

๐Ÿ“Š Enhanced Evidence Capture

  • Execution Traceability: Every finding linked to its source tool execution
  • Complete Command History: Full tool output preserved with each finding
  • Raw Evidence Storage: 2000-character snippets of actual tool output
  • Session Reconstruction: Ability to review exact commands and outputs from any scan

๐Ÿ”„ Smart Workflow System

  • Parameter Priority: Workflow parameters override config defaults
  • Self-Contained Workflows: Each workflow defines its own tool parameters
  • Fuzzy Matching: Intelligent workflow file discovery and loading
  • Multiple Report Formats: Markdown, HTML, and JSON with evidence inclusion

๐Ÿ”’ Security & Compliance

  • Scope Validation: Automatic blacklisting of private networks and unauthorized targets
  • Audit Logging: Complete transparency with detailed logs of all AI decisions and actions
  • Human-in-the-Loop: Configurable confirmation prompts for sensitive operations
  • Safe Mode: Prevents destructive actions by default

๐Ÿ“‹ Professional Reporting

  • Multiple Formats: Markdown, HTML, and JSON reports
  • Executive Summaries: Non-technical overviews for stakeholders
  • Technical Deep-Dives: Detailed findings with evidence and remediation steps
  • Evidence Sections: Raw tool output embedded in reports
  • AI Decision Traces: Full transparency into AI reasoning process

โšก Performance & Efficiency

  • Asynchronous Execution: Parallel tool execution for faster assessments
  • Workflow Automation: Predefined workflows (Recon, Web, Network, Autonomous)
  • Customizable: Create custom tools and workflows via simple YAML/Python

๐Ÿ“‹ Prerequisites

Required

Optional Tools (for full functionality)

Guardian can intelligently use these tools if installed:

ToolPurposeInstallation
nmapPort scanningapt install nmap / choco install nmap
masscanUltra-fast scanapt install masscan / Build from source
httpxHTTP probinggo install github.com/projectdiscovery/httpx/cmd/httpx@latest
subfinderSubdomain enumgo install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
amassNetwork mappinggo install github.com/owasp-amass/amass/v4/...@master
nucleiVuln scanninggo install github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
whatwebTech fingerprintgem install whatweb / apt install whatweb
wafw00fWAF detectionpip install wafw00f
niktoWeb vuln scanapt install nikto
sqlmapSQL injectionpip install sqlmap / apt install sqlmap
wpscanWordPress scangem install wpscan
testsslSSL/TLS testingDownload from testssl.sh
sslyzeSSL/TLS analysispip install sslyze
gobusterDirectory brutego install github.com/OJ/gobuster/v3@latest
ffufWeb fuzzinggo install github.com/ffuf/ffuf/v2@latest
arjunParameter discoverypip install arjun
xsstrikeAdvanced XSSgit clone https://github.com/s0md3v/XSStrike
gitleaksSecret scanninggo install github.com/zricethezav/gitleaks/v8@latest
cmseekCMS detectionpip install cmseek
dnsreconDNS enumerationpip install dnsrecon

Note: Guardian works without external tools but with limited scanning capabilities. The AI will adapt based on available tools.


๐Ÿš€ Installation

Step 1: Clone Repository

git clone https://github.com/zakirkun/guardian-cli.git
cd guardian-cli

Step 2: Set Up Python Environment

Linux/macOS:

python3 -m venv venv
source venv/bin/activate
pip install -e .

Windows:

python -m venv venv
.\venv\Scripts\activate
pip install -e .

Step 3: Configure AI Provider

Guardian supports multiple AI providers. Configure your preferred provider in config/guardian.yaml:

# config/guardian.yaml
ai:
  # Choose your provider: openai, claude, gemini, or openrouter
  provider: openai
  
  # OpenAI Configuration (recommended)
  openai:
    model: gpt-4o
    api_key: sk-your-api-key-here  # Or set OPENAI_API_KEY env var
  
  # Claude Configuration
  claude:
    model: claude-3-5-sonnet-20241022
    api_key: null  # Or set ANTHROPIC_API_KEY env var
  
  # Gemini Configuration
  gemini:
    model: gemini-2.5-pro
    api_key: null  # Or set GOOGLE_API_KEY env var
  
  # OpenRouter Configuration
  openrouter:
    model: anthropic/claude-3.5-sonnet
    api_key: null  # Or set OPENROUTER_API_KEY env var

Or use environment variables:

# Linux/macOS
export OPENAI_API_KEY="sk-your-key-here"
export ANTHROPIC_API_KEY="sk-ant-your-key-here"
export GOOGLE_API_KEY="your-gemini-key"
export OPENROUTER_API_KEY="your-router-key"

# Windows PowerShell
$env:OPENAI_API_KEY="sk-your-key-here"
$env:ANTHROPIC_API_KEY="sk-ant-your-key-here"

Step 4: Initialize Configuration

# Verify installation
python -m cli.main --help

# Check AI provider status
python -m cli.main models

๐ŸŽฏ Quick Start

Basic Commands

# List available workflows
python -m cli.main workflow list

# View AI providers and models
python -m cli.main models

# Run with specific provider
python -m cli.main workflow run --name web_pentest --target example.com --provider openai

Example Usage Scenarios

1. Quick Web Application Pen Test

# Fast security check with evidence capture
python -m cli.main workflow run --name web_pentest --target https://dvwa.csalab.app

Expected Output:

  • โœ… HTTP discovery with httpx
  • โœ… Vulnerability scan with nuclei
  • โœ… Full evidence linking (commands + outputs)
  • โœ… Markdown report with findings

2. Comprehensive Network Assessment

# Full network penetration test
python -m cli.main workflow run --name network --target 192.168.1.0/24

3. Custom Workflow with Parameters

# Run with workflow-specific parameters
# Parameters in workflow YAML override config defaults
python -m cli.main workflow run --name web_pentest --target example.com

Workflow Parameter Priority:

  1. Workflow YAML parameters (highest priority)
  2. Config file parameters
  3. Tool defaults (lowest priority)

4. Generate Report from Session

# Create HTML report with evidence
python -m cli.main report --session 20260203_175905 --format html

5. Switch AI Providers

# Use OpenAI GPT-4
python -m cli.main workflow run --name web_pentest --target example.com --provider openai

# Use Claude
python -m cli.main workflow run --name web_pentest --target example.com --provider claude

# Use Gemini
python -m cli.main workflow run --name web_pentest --target example.com --provider gemini

Windows Users: Use python -m cli.main instead of guardian


๐Ÿ”ง Configuration

Complete Configuration Reference

Edit config/guardian.yaml to customize Guardian’s behavior:

# AI Configuration
ai:
  provider: openai  # openai, claude, gemini, openrouter
  
  openai:
    model: gpt-4o
    api_key: sk-your-key  # Or use OPENAI_API_KEY env var
  
  claude:
    model: claude-3-5-sonnet-20241022
    api_key: null
  
  gemini:
    model: gemini-2.5-pro
    api_key: null
  
  temperature: 0.2
  max_tokens: 8000

# Penetration Testing Settings
pentest:
  safe_mode: true              # Prevent destructive actions
  require_confirmation: true   # Confirm before each step
  max_parallel_tools: 3        # Concurrent tool execution
  max_depth: 3                 # Maximum scan depth
  tool_timeout: 300            # Tool timeout in seconds

# Output Configuration
output:
  format: markdown             # markdown, html, json
  save_path: ./reports
  include_reasoning: true
  verbosity: normal            # quiet, normal, verbose, debug

# Scope Validation
scope:
  blacklist:                   # Never scan these
    - 127.0.0.0/8
    - 10.0.0.0/8
    - 172.16.0.0/12
    - 192.168.0.0/16
  require_scope_file: false
  max_targets: 100

# Tool Configuration (defaults)
tools:
  httpx:
    threads: 50
    timeout: 10
    tech_detect: true
  
  nuclei:
    severity: ["critical", "high", "medium"]
    templates_path: ~/nuclei-templates
  
  nmap:
    default_args: "-sV -sC"
    timing: T4

Workflow Parameters

Create custom workflows in workflows/ directory:

# workflows/custom_web.yaml
name: custom_web_assessment
description: Custom web security testing

steps:
  - name: http_discovery
    type: tool
    tool: httpx
    parameters:
      threads: 100        # Override config default (50)
      timeout: 15         # Override config default (10)
      tech_detect: true
  
  - name: vulnerability_scan
    type: tool
    tool: nuclei
    parameters:
      severity: ["critical", "high"]  # Override config
      templates_path: ".shared/nuclei/templates/"
  
  - name: generate_report
    type: report
    # Format will use config default (markdown)

Parameter Priority:

  • Workflow parameters override config parameters
  • Config parameters override tool defaults
  • Self-contained, reusable workflows

๐Ÿ“– Documentation

User Guides

Developer Guides

Architecture Overview

Guardian Architecture:
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚         AI Provider Layer               โ”‚
โ”‚  (OpenAI, Claude, Gemini, OpenRouter)   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                 โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚       Multi-Agent System                โ”‚
โ”‚  Planner โ†’ Tool Agent โ†’ Analyst โ†’      โ”‚
โ”‚            Reporter                      โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                 โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚      Workflow Engine                    โ”‚
โ”‚  - Parameter Priority                   โ”‚
โ”‚  - Evidence Capture                     โ”‚
โ”‚  - Session Management                   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                 โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚      Tool Integration Layer             โ”‚
โ”‚  (19 Security Tools)                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿ—๏ธ Project Structure

guardian-cli/
โ”œโ”€โ”€ ai/                    # AI integration
โ”‚   โ””โ”€โ”€ providers/         # Multi-provider support
โ”‚       โ”œโ”€โ”€ base_provider.py
โ”‚       โ”œโ”€โ”€ openai_provider.py
โ”‚       โ”œโ”€โ”€ claude_provider.py
โ”‚       โ”œโ”€โ”€ gemini_provider.py
โ”‚       โ””โ”€โ”€ openrouter_provider.py
โ”œโ”€โ”€ cli/                   # Command-line interface
โ”‚   โ””โ”€โ”€ commands/         # CLI commands (init, scan, recon, etc.)
โ”œโ”€โ”€ core/                  # Core agent system
โ”‚   โ”œโ”€โ”€ agent.py          # Base agent
โ”‚   โ”œโ”€โ”€ planner.py        # Planner agent
โ”‚   โ”œโ”€โ”€ tool_agent.py     # Tool selection agent
โ”‚   โ”œโ”€โ”€ analyst_agent.py  # Analysis agent
โ”‚   โ”œโ”€โ”€ reporter_agent.py # Reporting agent
โ”‚   โ”œโ”€โ”€ memory.py         # State management
โ”‚   โ””โ”€โ”€ workflow.py       # Workflow orchestration
โ”œโ”€โ”€ tools/                 # Pentesting tool wrappers
โ”‚   โ”œโ”€โ”€ nmap.py           # Nmap integration
โ”‚   โ”œโ”€โ”€ masscan.py        # Masscan integration
โ”‚   โ”œโ”€โ”€ httpx.py          # httpx integration
โ”‚   โ”œโ”€โ”€ subfinder.py      # Subfinder integration
โ”‚   โ”œโ”€โ”€ amass.py          # Amass integration
โ”‚   โ”œโ”€โ”€ nuclei.py         # Nuclei integration
โ”‚   โ”œโ”€โ”€ sqlmap.py         # SQLMap integration
โ”‚   โ”œโ”€โ”€ wpscan.py         # WPScan integration
โ”‚   โ”œโ”€โ”€ whatweb.py        # WhatWeb integration
โ”‚   โ”œโ”€โ”€ wafw00f.py        # Wafw00f integration
โ”‚   โ”œโ”€โ”€ nikto.py          # Nikto integration
โ”‚   โ”œโ”€โ”€ testssl.py        # TestSSL integration
โ”‚   โ”œโ”€โ”€ sslyze.py         # SSLyze integration
โ”‚   โ”œโ”€โ”€ gobuster.py       # Gobuster integration
โ”‚   โ”œโ”€โ”€ ffuf.py           # FFuf integration
โ”‚   โ””โ”€โ”€ ...               # 15 tools total
โ”œโ”€โ”€ workflows/             # Workflow definitions (YAML)
โ”œโ”€โ”€ utils/                 # Utilities (logging, validation)
โ”œโ”€โ”€ config/                # Configuration files
โ”œโ”€โ”€ docs/                  # Documentation
โ””โ”€โ”€ reports/               # Generated reports

๐Ÿ†• Latest Updates

Version 2.0.0 - Major Release

โœจ Multi-Provider AI Support

  • 4 AI Providers: OpenAI, Claude, Gemini, OpenRouter
  • Easy Switching: Configure via config/guardian.yaml or CLI flags
  • Provider Abstraction: Unified interface for all providers

๐Ÿ“Š Evidence Capture System

  • Execution Linking: Every finding linked to its source tool execution
  • Raw Evidence: Full command output preserved (2000-char snippets)
  • Traceability: Reconstruct exact workflow execution from session files

๐Ÿ”„ Smart Workflow Parameters

  • Priority System: Workflow params > Config > Defaults
  • Self-Contained: Workflows define their own parameters
  • No Conflicts: Multiple workflows can use different settings for same tools

๐Ÿ› Bug Fixes

  • Fixed workflow fuzzy matching logic
  • Corrected report format handling
  • Improved YAML parsing with better error messages

๐Ÿค Contributing

We welcome contributions! Here’s how:

Setting Up Development Environment

# Fork and clone
git clone https://github.com/zakirkun/guardian-cli.git
cd guardian-cli

# Install dev dependencies
pip install -e ".[dev]"

# Run tests
pytest tests/

# Format code
black .

Contribution Areas

  • ๐Ÿค– AI Provider Integrations - Add more AI models
  • ๐Ÿ› ๏ธ New Tool Integrations - Add more security tools
  • ๐Ÿ”„ Custom Workflows - Share your workflow templates
  • ๐Ÿ› Bug Fixes - Report and fix issues
  • ๐Ÿ“š Documentation - Improve guides and examples
  • ๐Ÿงช Testing - Expand test coverage

See CONTRIBUTING.md for detailed guidelines.


๐Ÿ“Š Roadmap

  • Multi-provider AI support (OpenAI, Claude, Gemini, OpenRouter)
  • Complete evidence capture with execution linking
  • Workflow parameter priority system
  • Web Dashboard for visualization
  • PostgreSQL backend for multi-session tracking
  • MITRE ATT&CK mapping for findings
  • Plugin system for custom modules
  • Integration with CI/CD pipelines
  • Additional AI models (Llama, Mistral)
  • Real-time collaboration features

๐Ÿ› Troubleshooting

Common Issues

Import Errors

# Reinstall dependencies
pip install -e . --force-reinstall

AI Provider Errors

# Verify API key is set
python -m cli.main models

# Check provider configuration
cat config/guardian.yaml | grep -A 5 "ai:"

Tool Not Found

# Check tool availability
which nmap
which httpx

# Install missing tools (see Prerequisites)

Workflow Not Loading

# Check workflow file exists
ls workflows/web_pentest.yaml

# Verify YAML syntax
python -c "import yaml; yaml.safe_load(open('workflows/web_pentest.yaml'))"

Windows Command Not Found

# Use full command
python -m cli.main --help

For more help, open an issue.


๐Ÿ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.


๐Ÿ™ Acknowledgments

  • OpenAI - GPT-4 capabilities
  • Anthropic - Claude AI
  • Google - Gemini AI
  • LangChain - AI orchestration framework
  • ProjectDiscovery - Open-source security tools (httpx, subfinder, nuclei)
  • Nmap - Network exploration and security auditing
  • The Security Community - Tool developers and researchers

๐Ÿ“ž Support & Contact


๐ŸŒŸ Star History

Star History Chart

Guardian - Intelligent, Ethical, Automated Penetration Testing

Made with โค๏ธ by the Security Community

โฌ† Back to Top