
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
pwnkit-cli
Advanced tools
AI-powered agentic security scanner. Scan endpoints, audit packages, review source code. Autonomous agents discover, attack, verify, and report.
Let autonomous AI agents hack you so the real ones can't.
Fully autonomous agentic pentesting framework. Blind PoC verification to minimize false positives.
Docs · Website · Blog · Benchmark
Autonomous AI agents that pentest web apps, LLM endpoints, npm packages, and source code. The agent gets a bash tool and acts like a real pentester — writing curl commands, Python exploit scripts, and chaining vulnerabilities. Every finding is independently re-exploited by a blind verify agent to kill false positives.
npx pwnkit-cli
# Pentest a web app
npx pwnkit-cli scan --target https://example.com --mode web
# Scan an LLM endpoint
npx pwnkit-cli scan --target https://your-app.com/api/chat
# Audit an npm package
npx pwnkit-cli audit lodash
# Review source code
npx pwnkit-cli review ./my-app
# Auto-detect — just give it a target
npx pwnkit-cli https://example.com
npx pwnkit-cli express
npx pwnkit-cli ./my-repo
See the documentation for configuration, runtime modes, and CI/CD setup.
The agent gets 3 tools: bash, save_finding, done. It runs curl, writes Python scripts, chains exploits — the same way a human pentester works. No templates, no static rules.
Research Agent Blind Verify Agent Report
discover + attack + PoC --> gets ONLY PoC + path --> SARIF / JSON / MD
no reasoning, no bias only confirmed findings
can't reproduce? killed
The blind verification is the differentiator. The verify agent can't be biased by the research agent's reasoning.
Tested against the XBOW benchmark — 104 Docker CTF challenges covering SQLi, IDOR, SSTI, SSRF, file upload, deserialization, auth bypass, and more.
35 flags extracted across IDOR, SQLi, blind SQLi, SSTI, RCE, SSRF, LFI, XXE, file upload, deserialization, auth bypass, business logic, and cookie manipulation.
| Tool | Score | Approach |
|---|---|---|
| Shannon | 96.15% | White-box, source-aware |
| KinoSec | 92.3% | Black-box, proprietary |
| XBOW | 85% | Purpose-built |
| Cyber-AutoAgent | 84.62% | Open-source, meta-agent |
| pwnkit | testing | Open-source, shell-first |
10 custom challenges covering prompt injection, jailbreaks, system prompt extraction, PII leakage, encoding bypass, multi-turn escalation, MCP SSRF.
100% (10/10) — all flags extracted, zero false positives.
pnpm bench --agentic # AI/LLM benchmark
See benchmark details.
- uses: peaktwilight/pwnkit@main
with:
mode: review
path: .
format: sarif
env:
OPENROUTER_API_KEY: ${{ secrets.OPENROUTER_API_KEY }}
Created by a security researcher with 7 published CVEs. pwnkit exists because modern attack surfaces require agents that adapt, not static rules that don't.
git clone https://github.com/peaktwilight/pwnkit.git
cd pwnkit && pnpm install && pnpm test
See CONTRIBUTING.md for guidelines.
Built by Peak Twilight -- also building FoxGuard, vibecheck, unfuck, whatdiditdo
FAQs
AI-powered agentic security scanner. Scan endpoints, audit packages, review source code. Autonomous agents discover, attack, verify, and report.
The npm package pwnkit-cli receives a total of 1,804 weekly downloads. As such, pwnkit-cli popularity was classified as popular.
We found that pwnkit-cli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.