bughunter-ai

agent
Security Audit
Fail
Health Pass
  • License — License: MIT
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Community trust — 20 GitHub stars
Code Fail
  • network request — Outbound network request in skills/BugBountyFramework/Tools/auth-manager.ts
  • network request — Outbound network request in skills/BugBountyFramework/Tools/burp-bridge.ts
  • spawnSync — Synchronous process spawning in skills/BugBountyFramework/Tools/credential-vault.ts
  • process.env — Environment variable access in skills/BugBountyFramework/Tools/credential-vault.ts
  • eval() — Dynamic code execution via eval() in skills/BugBountyFramework/Tools/playwright-harness.ts
  • network request — Outbound network request in skills/BugBountyFramework/Tools/playwright-harness.ts
Permissions Pass
  • Permissions — No dangerous permissions requested

No AI report is available for this listing yet.

SUMMARY

Autonomous Bug Bounty Hunting Framework powered by Claude Code. 20 AI agents, state-machine orchestration, Burp Suite MCP, credential vault, LLM security track. Type 'hunt target.com' and let AI find the bugs.

README.md

BugHunter AI

BugHunter AI

Autonomous Bug Bounty Hunting Framework Powered by Claude Code + PAI

28 specialized AI agents. 8 orchestrated workflows. State-machine orchestration. 51 skills. Zero human input required.

Quick StartFull SetupSuperpowersArchitectureAgentsPromptsContributing

Claude Code PAI v3.0 28 Agents 51 Skills Bun Burp MCP MIT License


What is BugHunter AI?

BugHunter AI is an autonomous bug bounty hunting framework that turns Claude Code into an elite security researcher. Built on top of the PAI (Personal AI Infrastructure) system, it combines 20 specialized vulnerability agents, 51 skills, 13 expert AI agents, 20 lifecycle hooks, and a full offensive security toolchain into a single command:

# That's it. One command. Autonomous hunting.
hunt https://app.example.com

What happens next:

  1. A state machine initializes and tracks 10 phases of the hunt
  2. Credentials are loaded from an encrypted vault (never inline)
  3. The app is profiled — flows mapped, tech stack fingerprinted, trust boundaries identified
  4. Hypothesis-driven agents deploy in parallel — each with a specific attack theory
  5. Findings are reported in real-time with CVSS scoring
  6. A professional bug bounty report is generated automatically

Why BugHunter AI?

Manual Bug Bounty BugHunter AI
Hours of recon before first payload Autonomous recon → profiling → attack in minutes
Forget where you left off between sessions State machine checkpoints every phase — --resume anytime
Credentials in plaintext notes Encrypted vault with 1Password integration
Run same tools blindly on every target Hypothesis-driven: agents attack WHERE the AppProfile says bugs live
Test one thing at a time 5 agents run in parallel, findings shared in real-time
Miss AI/LLM vulnerabilities Dedicated LLMSecurityAgent with OWASP LLM Top 10
Medium findings silently dropped Mediums archived for attack chain correlation
No memory between hunts Cross-session learning — gets smarter with every engagement
Single tool / single domain 51 skills covering web, mobile, API, cloud, network, binary, AI

The Full Stack: PAI + Superpowers + BugHunter

BugHunter AI is not just a skill — it's part of a complete offensive security infrastructure. Here's what you get when you install the full setup:

PAI (Personal AI Infrastructure) v3.0

The foundation layer. PAI is a general problem-solving system that provides:

  • The Algorithm (v1.5.0) — 7-phase structured reasoning (OBSERVE → THINK → PLAN → BUILD → EXECUTE → VERIFY → LEARN)
  • 51 Skills — Specialized capabilities from security to content creation
  • 13 Expert Agents — Architect, Engineer, Pentester, Researcher variants, QA Tester, and more
  • 20 Lifecycle Hooks — Automated security validation, session management, algorithm tracking
  • Cross-Session Memory — Persistent learning across conversations
  • Voice System — ElevenLabs TTS integration with custom AI personality
  • Multi-Channel Notifications — ntfy, Discord, Twilio alerts for long tasks and findings

Superpowers Plugin

Claude Code's official superpowers plugin adds enhanced capabilities:

  • Extended tool access and MCP server integration
  • Advanced agent orchestration with team mode
  • Enhanced permission management

Security Skill Stack (16 Skills)

Skill Coverage
BugBountyFramework Autonomous 10-phase hunt orchestration
WebAssessment OWASP WSTG v5, OWASP Top 10
SecurityHub Master security command center with intelligent skill routing
OffensiveSecurityOrchestrator Kill chain tracking, adaptive methodology
APISecurityTesting REST, GraphQL, gRPC, BOLA, BFLA, mass assignment
MobileSecurity OWASP MASTG v2, Frida, Objection, MobSF
NetworkSecurity AD attacks, BloodHound, Kerberoasting, pivoting
CloudSecurity AWS/Azure/GCP, IAM escalation, Pacu, ScoutSuite
ExploitDev Heap exploitation, ROP chains, safe-linking bypass
ReverseEngineering Ghidra, radare2, binary analysis
MalwareAnalysis Static/dynamic analysis, YARA, IOC extraction
PromptInjection OWASP LLM Top 10, MITRE ATLAS
VulnResearch CVE development, AFL++ fuzzing, CodeQL
SASTOrchestration Semgrep, CodeQL, custom rules, taint tracking
SCASecurity SBOM, supply chain, dependency confusion
ThreatModeling STRIDE, PASTA, attack trees
Recon Subdomain enum, asset discovery, Shodan
RedTeam 32-agent adversarial analysis

Expert Agent Army (13 Agents)

Agent Specialty
Pentester Offensive security specialist — vulnerability assessment, exploitation
Engineer Elite principal engineer — TDD, strategic planning
Architect System design — constitutional principles, feature specs
Algorithm PAI Algorithm expert — ISC creation and evolution
Designer UX/UI specialist — Figma, shadcn/ui
Artist Visual content — Flux, GPT-Image-1, prompt engineering
QATester Browser-automation validation — Gate 4 completion gates
Intern 176-IQ generalist — multi-faceted problem solving
ClaudeResearcher Multi-query academic research via Claude WebSearch
CodexResearcher Technical archaeology — O3, GPT-5-Codex consultation
GeminiResearcher Multi-perspective research via Google Gemini
GrokResearcher Contrarian analysis via xAI Grok
PerplexityResearcher Investigative journalism via Perplexity

MCP Servers (3 Core + 5 Recommended)

Core (Pre-configured):

Server Purpose
Burp Suite MCP Proxy traffic analysis, scope sync, Collaborator, HAR export
Filesystem MCP Direct file system access
GitHub MCP Repository operations, PR management

Recommended Security MCPs:

Server Purpose Install
Shodan Internet asset search npm install -g @shodan/mcp-server
VirusTotal Malware/IOC analysis npx -y @virustotal/mcp-server
CVE/NVD Vulnerability database Custom Python server
Nuclei Vulnerability scanning Custom Node server
GitHub Security Advisory CVE tracking Via GitHub MCP

Plugins (4 Active)

Plugin Purpose
superpowers Enhanced Claude Code capabilities
claude-mem Persistent cross-session memory
swift-lsp Swift language server protocol
ui-ux-pro-max Advanced UI/UX design capabilities

Lifecycle Hooks (20 Hooks)

Hook Trigger Purpose
SecurityValidator Pre: Bash, Edit, Write, Read Validates all tool calls for security
VoiceGate Pre: Bash Voice notification gate
AgentExecutionGuard Pre: Task Guards agent execution
SkillGuard Pre: Skill Validates skill invocations
SetQuestionTab Pre: AskUserQuestion Terminal tab management
AlgorithmTracker Post: Bash, Task* Tracks algorithm phase progression
QuestionAnswered Post: AskUserQuestion Tracks Q&A flow
WorkCompletionLearning SessionEnd Captures learnings from work
SessionSummary SessionEnd Generates session summaries
RelationshipMemory SessionEnd Builds relationship context
UpdateCounts SessionEnd Updates system statistics
IntegrityCheck SessionEnd Validates system integrity
RatingCapture UserPromptSubmit Captures quality ratings
AutoWorkCreation UserPromptSubmit Auto-creates work tracking
UpdateTabTitle UserPromptSubmit Dynamic terminal tab titles
SessionAutoName UserPromptSubmit Auto-names sessions
StartupGreeting SessionStart Displays PAI banner
LoadContext SessionStart Loads session context
CheckVersion SessionStart Version checks
StopOrchestrator Stop Clean shutdown handling

Architecture

flowchart TB
    subgraph Input["User Input"]
        A["hunt target.com"]
        B["hunt --config target.json"]
        C["hunt --apk app.apk"]
    end

    subgraph PAI["PAI Infrastructure (v3.0)"]
        direction TB
        ALG["The Algorithm (7 phases)"]
        SK["51 Skills"]
        HK["20 Hooks"]
        MEM["Cross-Session Memory"]
        VOICE["Voice System"]
    end

    subgraph Orchestrator["Hunt Orchestrator (State Machine)"]
        direction TB
        P0["Phase 0: INIT"]
        P1["Phase 1: MEMORY_LOAD"]
        P2["Phase 2: TARGET_INGEST"]
        P3["Phase 3: APP_UNDERSTANDING"]
        P4["Phase 4: RECON"]
        P5["Phase 5: AGENT_DEPLOY"]
        P6["Phase 6: DYNAMIC_TEST"]
        P7["Phase 7: VULN_ASSESS"]
        P8["Phase 8: LEARNING"]
        P9["Phase 9: REPORT"]

        P0 --> P1 --> P2 --> P3 --> P4 --> P5 --> P6 --> P7 --> P8 --> P9
    end

    subgraph Tools["Tool Layer"]
        V["Credential Vault"]
        AU["Auth Manager"]
        BB["Burp Bridge"]
        PW["Playwright Harness"]
        AP["Appium Harness"]
    end

    subgraph MCPs["MCP Servers"]
        BURP["Burp Suite MCP"]
        FS["Filesystem MCP"]
        GH["GitHub MCP"]
        SH["Shodan MCP"]
        VT["VirusTotal MCP"]
    end

    subgraph Agents["Agent Army (Parallel)"]
        direction LR
        AG1["XSSAgent"]
        AG2["SQLiAgent"]
        AG3["SSRFAgent"]
        AG4["IDORAgent"]
        AG5["AuthAgent"]
        AG6["LLMSecurityAgent"]
        AG7["APIAgent"]
        AG8["MobileAgent"]
        AG9["...12 more"]
    end

    subgraph SecuritySkills["Security Skills (16)"]
        direction LR
        SS1["WebAssessment"]
        SS2["SecurityHub"]
        SS3["APISecurityTesting"]
        SS4["PromptInjection"]
        SS5["...12 more"]
    end

    subgraph Output["Output"]
        R["Bug Bounty Report"]
        F["Real-time Findings"]
        D["Live Dashboard"]
        N["Notifications (ntfy/Discord/SMS)"]
    end

    Input --> PAI
    PAI --> Orchestrator
    P2 --> V
    P3 --> AU
    P3 --> BB
    P4 --> SecuritySkills
    P5 --> Agents
    P6 --> PW
    P6 --> AP
    Agents --> MCPs
    Agents --> F
    P9 --> R
    Orchestrator --> D
    F --> N

    style PAI fill:#1e3a5f,stroke:#3b82f6,color:#fff
    style Orchestrator fill:#1a1a2e,stroke:#e94560,color:#fff
    style Agents fill:#0f3460,stroke:#e94560,color:#fff
    style Tools fill:#16213e,stroke:#0f3460,color:#fff
    style MCPs fill:#1a1a3e,stroke:#00d2ff,color:#fff
    style SecuritySkills fill:#2d1b69,stroke:#8b5cf6,color:#fff
    style Input fill:#533483,stroke:#e94560,color:#fff
    style Output fill:#0f3460,stroke:#00d2ff,color:#fff

Quick Start

For the minimal BugHunter-only install:

git clone https://github.com/h4ckologic/bughunter-ai.git
cd bughunter-ai
./install.sh

For the full setup with PAI, Superpowers, and all security skills, see the Full Setup Guide.


Full Setup Guide

See SETUP.md for the complete, step-by-step guide to replicate the full infrastructure:

  1. Install prerequisites (Claude Code, Bun, Go tools, Burp Suite)
  2. Install PAI v3.0 (the foundation)
  3. Configure your identity (DA + Principal)
  4. Install plugins (Superpowers, claude-mem, ui-ux-pro-max)
  5. Configure MCP servers (Burp, Filesystem, GitHub)
  6. Install BugHunter AI skill
  7. Set up optional security MCPs (Shodan, VirusTotal, NVD)
  8. Configure notifications (ntfy, Discord, Twilio)
  9. Verify the installation

Hunt Modes

Mode CVSS Threshold Finding Target Best For
bounty (default) >= 8.0 10 Bug bounty programs — only critical/high findings
pentest >= 4.0 20 Penetration tests — comprehensive coverage
comprehensive >= 0.0 50 Full security audits — everything documented
hunt https://target.com                       # bounty mode (default)
hunt https://target.com --mode pentest        # pentest mode
hunt https://target.com --mode comprehensive  # comprehensive mode

Agents

BugHunter deploys 20 specialized agents, each an expert in one vulnerability class:

Agent Focus Key Techniques
AppReviewAgent Application understanding Flow mapping, tech fingerprinting, trust boundary analysis
LLMSecurityAgent AI/LLM vulnerabilities OWASP LLM Top 10, prompt injection, RAG poisoning
XSSAgent Cross-site scripting Reflected, stored, DOM-based, mutation XSS
SQLiAgent SQL injection Union, blind, time-based, second-order SQLi
SSRFAgent Server-side request forgery Cloud metadata, internal services, protocol smuggling
IDORAgent Insecure direct object refs Horizontal/vertical privilege escalation, UUID prediction
AuthAgent Authentication bypass JWT attacks, session fixation, OAuth flaws, MFA bypass
APIAgent API security BOLA, mass assignment, rate limiting, GraphQL introspection
CORSAgent CORS misconfiguration Origin reflection, null origin, wildcard subdomains
FileUploadAgent File upload attacks Content-type bypass, polyglot files, path traversal
XXEAgent XML external entities Blind XXE, OOB data exfiltration, SSRF via XXE
RCEAgent Remote code execution Command injection, SSTI, deserialization, SSRF→RCE
BusinessLogicAgent Business logic flaws Race conditions, price manipulation, workflow bypass
MobileAgent Android/iOS security SSL pinning bypass, exported components, insecure storage
WindowsAgent Windows/AD attacks Kerberoasting, NTLM relay, privilege escalation
ReconAgent Reconnaissance Subdomain enum, port scanning, tech fingerprinting
ReverseEngineeringAgent Binary analysis Static analysis, dynamic analysis, vulnerability identification
ExploitDevAgent Exploit development PoC creation, payload crafting, reliability testing
DesktopAppAgent Desktop app security Electron, .NET, Java app testing
GraphQLAgent GraphQL security Introspection, batch abuse, nested DoS, relay IDOR, subscription hijack
WebSocketAgent WebSocket security CSWSH, message injection, origin bypass, auth hijacking
CSRFAgent CSRF exploitation Token/SameSite/Referer bypass, content-type tricks, CORS+CSRF chains
CachePoisoningAgent Web cache poisoning Unkeyed header injection, cache deception, CDN-specific bypasses
HTTPSmugglingAgent HTTP request smuggling CL.TE, TE.CL, H2.CL desync, response queue poisoning
SubdomainTakeoverAgent Subdomain takeover Dangling DNS, cloud service fingerprinting, cookie/CSP impact
RaceConditionAgent Race conditions HTTP/2 single-packet attack, limit bypass, double-spend, TOCTOU
PrototypePollutionAgent Prototype pollution Client-side PP→XSS gadgets, server-side PP→RCE, AST injection
LLMAgent Legacy LLM testing Basic prompt testing (superseded by LLMSecurityAgent)

How Agents Work

Agents don't blindly scan. They receive specific hypotheses from the AppProfile:

Traditional scanning:          BugHunter AI:
"Run sqlmap on all URLs"   →   "The /api/v1/reports?filter= parameter
                                is passed into a PostgreSQL ORDER BY
                                clause — test time-based blind SQLi HERE"

This means 90% less noise and 10x faster confirmation.


Orchestrator Workflows

The hunt orchestrator classifies your target and dispatches the appropriate workflow. Each workflow defines its own phases, agent dispatch order, parallelism, and gate conditions.

Workflow Trigger Phases Agents Lines
W_HUNT_WEB Web application URL 10 21 agents (parallel) 2,018
W_HUNT_API API endpoint / Swagger / GraphQL 9 10 agents 487
W_HUNT_LLM AI/LLM app (chatbot, RAG, copilot) 13 8 agents 688
W_HUNT_MOBILE APK / IPA file 10 7 agents 1,037
W_HUNT_NETWORK IP range / CIDR / AD target 9 5 agents 814
W_HUNT_CLOUD AWS / Azure / GCP environment 10 5 agents 607
W_HUNT_THICK_CLIENT Electron / .NET / Java desktop app 10 6 agents 874
W_RECON Standalone recon request 10 2 agents 703

How Workflows Work

hunt https://target.com
  │
  ├── Orchestrator classifies target type
  ├── Loads W_HUNT_WEB workflow
  ├── Phase 1: RECON (ReconAgent + SubdomainTakeoverAgent)
  ├── Phase 2: APP PROFILING (AppReviewAgent via dev-browser)
  ├── Phase 3: AUTH TESTING (AuthAgent)
  ├── Phase 4: INJECTION (SQLi + XSS + XXE + RCE — PARALLEL)
  ├── Phase 5: ACCESS CONTROL (IDOR + CORS + CSRF — PARALLEL)
  ├── Phase 6: BUSINESS LOGIC (BusinessLogic + RaceCondition — PARALLEL)
  ├── Phase 7: ADVANCED (SSRF + CachePoisoning + HTTPSmuggling + PrototypePollution — PARALLEL)
  ├── Phase 8: API/PROTOCOL (GraphQL + WebSocket + API — PARALLEL, conditional)
  ├── Phase 9: FILE HANDLING (FileUploadAgent, conditional)
  └── Phase 10: REPORTING (aggregate, score, deduplicate, generate report)

Each phase has gate conditions — the workflow only advances when the gate criteria are met. Agents within a phase run in parallel for maximum speed.


Tool Chain

Tool File Purpose
Hunt Orchestrator Tools/hunt-orchestrator.ts State machine — phase tracking, checkpointing, resume, dashboard
Credential Vault Tools/credential-vault.ts Encrypted credential storage, 1Password, env vars, auto-redact
Auth Manager Tools/auth-manager.ts B2C/OAuth/SAML automation, session persistence, health checks
Burp Bridge Tools/burp-bridge.ts Burp Suite REST API bridge — scope sync, HAR export, Collaborator
Browser Harness Tools/playwright-harness.ts Browser automation via dev-browser CLI (primary) / Playwright CLI (fallback)
Appium Harness Tools/appium-harness.ts Mobile app testing — Android/iOS through proxy

Sample Prompts

Your First Hunt

hunt https://app.example.com

Hunt with Stored Credentials

Store credentials for example-corp: username [email protected], password SecureP@ss123

hunt https://app.example.com --creds vault:example-corp

Pentest Mode (Find More)

hunt https://staging.example.com --mode pentest

Hunt an AI Application

hunt https://ai-chatbot.example.com --mode pentest

Focus on AI-specific vulnerabilities:
- Extract the system prompt
- Test cross-user data access
- Try prompt injection (direct and indirect)
- Test RAG poisoning via document upload

Resume a Hunt

hunt https://app.example.com --resume

Full Power Hunt

hunt https://app.example.com using username [email protected] and password TestPass123

Use all available tools, skills, workflows, and MCPs.
Use Playwright and Burp MCPs to perform dynamic analysis.
Map the entire application attack surface.
Understand the application before attacking.
Find 10 high-severity vulnerabilities.
Don't stop until done.

Use Security Skills Directly

# Run a web assessment using the WebAssessment skill
/WebAssessment https://target.com

# Use the SecurityHub for guided methodology
/SecurityHub start assessment on https://target.com

# Run OSINT reconnaissance
/Recon https://target.com --deep

# Test LLM/AI security
/PromptInjection https://ai-app.com

See examples/sample-prompts.md for more.


Live Dashboard

Check hunt progress anytime:

hunt https://target.com --status
======================================================================
  HUNT STATUS: https://app.example.com
  Mode: BOUNTY | Elapsed: 45m | Findings: 3
  Min CVSS: 8.0 | Target: 10 findings
======================================================================
  [OK] INIT                  2s
  [OK] MEMORY_LOAD           1s
  [OK] TARGET_INGEST         3s
  [OK] APP_UNDERSTANDING     120s     (2 findings)
  [>>] RECON                 running...
  [  ] AGENT_DEPLOY
  [  ] DYNAMIC_TEST
  [  ] VULN_ASSESS
  [  ] LEARNING
  [  ] REPORT

  FINDINGS:
    F-001 [critical] SSRF: Webhook URL fetches AWS metadata
    F-002 [high] IDOR: Access other users' expense reports
    F-003 [high] XSS: Stored XSS in admin notification panel
======================================================================

Directory Structure

# BugHunter AI Skill (installed to ~/.claude/skills/)
~/.claude/skills/BugBountyFramework/
├── SKILL.md                     # Main skill definition (v2.0)
├── Agents/                      # 20 specialized vulnerability agents
│   ├── AppReviewAgent.md
│   ├── LLMSecurityAgent.md
│   ├── XSSAgent.md
│   ├── SQLiAgent.md
│   ├── SSRFAgent.md
│   ├── IDORAgent.md
│   ├── AuthAgent.md
│   ├── APIAgent.md
│   ├── CORSAgent.md
│   ├── FileUploadAgent.md
│   ├── XXEAgent.md
│   ├── RCEAgent.md
│   ├── BusinessLogicAgent.md
│   ├── MobileAgent.md
│   ├── WindowsAgent.md
│   ├── ReconAgent.md
│   ├── ReverseEngineeringAgent.md
│   ├── ExploitDevAgent.md
│   ├── DesktopAppAgent.md
│   └── LLMAgent.md
├── Tools/                       # TypeScript tools (Bun runtime)
│   ├── hunt-orchestrator.ts
│   ├── credential-vault.ts
│   ├── auth-manager.ts
│   ├── burp-bridge.ts
│   ├── playwright-harness.ts
│   └── appium-harness.ts
├── Templates/
│   ├── BugReport.md
│   └── TargetConfig.md
└── Wordlists/

# PAI Infrastructure (the foundation)
~/.claude/
├── settings.json                # Central config (identity, hooks, permissions, plugins)
├── CLAUDE.md                    # Entry point
├── .mcp.json                    # MCP server configuration
├── skills/                      # 51 skills
│   ├── PAI/                     # Core PAI system
│   ├── BugBountyFramework/      # This project
│   ├── WebAssessment/           # OWASP WSTG v5
│   ├── SecurityHub/             # Security command center
│   ├── OffensiveSecurityOrchestrator/
│   ├── APISecurityTesting/
│   ├── MobileSecurity/
│   ├── NetworkSecurity/
│   ├── CloudSecurity/
│   ├── ExploitDev/
│   ├── ReverseEngineering/
│   ├── MalwareAnalysis/
│   ├── PromptInjection/
│   ├── VulnResearch/
│   ├── SASTOrchestration/
│   ├── SCASecurity/
│   ├── ThreatModeling/
│   ├── Recon/
│   ├── RedTeam/
│   ├── OSINT/
│   ├── Research/                # Multi-engine research
│   ├── Browser/                 # Browser automation
│   ├── Fabric/                  # 240+ prompt patterns
│   └── ...35 more
├── agents/                      # 13 expert agent definitions
│   ├── Pentester.md
│   ├── Engineer.md
│   ├── Architect.md
│   └── ...10 more
├── hooks/                       # 20 lifecycle hooks
│   ├── SecurityValidator.hook.ts
│   ├── AlgorithmTracker.hook.ts
│   ├── LoadContext.hook.ts
│   ├── handlers/                # 7 hook handlers
│   └── lib/                     # 12 shared libraries
├── mcps/                        # Custom MCP servers
│   └── burp-mcp/
├── VoiceServer/                 # ElevenLabs TTS integration
└── MEMORY/                      # Persistent memory system
    ├── BugBounty/
    │   ├── Sessions/
    │   ├── Findings/
    │   ├── PatternDB/
    │   ├── LearningLogs/
    │   ├── TargetProfiles/
    │   └── Vault/
    ├── LEARNING/
    ├── SECURITY/
    ├── STATE/
    ├── WORK/
    └── VOICE/

How It Differs from Other Tools

Feature BugHunter AI Nuclei/Burp Scanner Manual Testing
Intelligence Understands the app first, then attacks Signature matching Human expertise
Context Remembers across sessions Stateless Notes/memory
Hypothesis-driven Tests specific theories Tests everything Depends on researcher
AI/LLM testing First-class OWASP LLM Top 10 Not supported Rare expertise
Parallel agents 5 specialized agents simultaneously Single scanner One person
State machine Checkpoints, resume, never loses progress Run from scratch Bookmarks/notes
Credential security Encrypted vault + 1Password Config files Plaintext notes
Multi-domain Web + Mobile + API + Cloud + Network + Binary Single domain Limited scope
Algorithm 7-phase structured reasoning (PAI) None Informal methodology
Skills ecosystem 51 skills, 16 security-focused Plugin-based Tool-dependent

Responsible Use

This framework is designed for authorized security testing only:

  • Only test applications you have written permission to test
  • Bug bounty programs with clearly defined scope
  • Penetration tests with signed engagement letters
  • Your own applications in staging/development environments

BugHunter AI enforces scope: The framework includes hard scope enforcement that blocks testing out-of-scope targets. Configure your scope before hunting.

The maintainers are not responsible for misuse. Always follow your program's rules of engagement.


Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

Ideas for contributions:

  • New specialized agents (e.g., GraphQLAgent, WebSocketAgent)
  • Additional auth strategy templates
  • Better wordlists
  • Integration with more MCP servers
  • New security skills
  • Improved report templates
  • Bug fixes and documentation

License

MIT License. See LICENSE for details.


Acknowledgements

  • Anthropic — Claude Code, the AI engine behind everything
  • Daniel Miessler / PAI — Personal AI Infrastructure v3.0 — the foundation layer providing the Algorithm (v1.5.0), 51 skills, 13 expert agents, 20 lifecycle hooks, cross-session memory, and the structured reasoning framework that makes autonomous hunting possible
  • Claude Code Superpowers — Official Claude Code plugin enabling enhanced tool access, advanced agent orchestration with team mode, and extended MCP server integration that powers parallel agent deployment
  • claude-mem — Persistent cross-session memory plugin that enables BugHunter's learning system to remember techniques, patterns, and findings across hunts
  • PortSwigger — Burp Suite integration via custom MCP bridge
  • ProjectDiscovery — Nuclei, httpx, subfinder, naabu — the recon backbone
  • Playwright — Browser automation for dynamic testing and app profiling
  • Bun — TypeScript runtime powering all tools and hooks
  • ElevenLabs — Voice synthesis for the PAI notification and voice system
  • ntfy — Push notifications for long-running hunts

Built with Claude Code + PAI by h4ckologic

If BugHunter AI helps you find bugs, give it a star!

Reviews (0)

No results found