Skip to content

An AI-assisted security scanner that detects real-world authentication, authorization, and logic vulnerabilities in web applications and APIs, and generates professional, human-readable security reports with exploitation insights and remediation guidance.

Notifications You must be signed in to change notification settings

codenik01/AI-Powered-Security-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” AI-Powered Security Scanner

A security engineering tool for detecting high-impact authorization, logic, and configuration vulnerabilities in modern web applications and APIs.

πŸ“Œ Overview

The AI-Powered Security Scanner is a purpose-built security engineering system designed to assist penetration testers and security teams in identifying real-world, high-impact vulnerabilities that are commonly missed by traditional automated scanners.

Unlike signature-based tools that prioritize breadth over accuracy, this project focuses on:

Behavioral analysis

Access-control validation

Context-aware vulnerability detection

The scanner combines deterministic security testing logic with AI-assisted analysis to produce findings that are:

Explainable

Reproducible

Suitable for professional security reports

🧠 Design Principles πŸ”Ž Signal Over Noise

Focus on vulnerabilities that matter in real production systems.

βš™οΈ Deterministic Core, Assisted Intelligence

All scanning logic is transparent and reproducible

AI is used only for analysis and explanation

πŸ›‘οΈ Security-Engineer First

Findings are written the way a human security engineer would report them.

πŸ“Š Auditability

Every result is traceable to:

Specific request

Specific response

Clear decision path

🧩 Security Coverage

The scanner prioritizes high-risk vulnerability classes:

πŸ”“ Authorization bypasses (IDOR, missing access checks)

πŸ” Business logic flaws

πŸ”‘ Authentication & token handling issues

⚠️ Security misconfigurations

🌐 Insecure API behavior & exposure

These issues commonly lead to:

Account compromise

Data leakage

Privilege escalation

πŸ€– Role of AI

AI is not used for blind vulnerability discovery.

Instead, it is used to:

Analyze behavioral differences in HTTP responses

Explain the root cause of issues

Assess technical and business impact

Generate developer-friendly remediation guidance

The scanning engine remains fully deterministic, ensuring all findings are verifiable.

πŸ— Architecture Overview . β”œβ”€β”€ app.py # API entrypoint β”œβ”€β”€ scanner/ β”‚ β”œβ”€β”€ core.py # Request orchestration & scan flow β”‚ β”œβ”€β”€ ai_analyzer.py # AI-assisted analysis layer β”‚ └── detectors/ β”‚ β”œβ”€β”€ auth.py # Authentication & authorization tests β”‚ β”œβ”€β”€ idor.py # IDOR detection logic β”‚ β”œβ”€β”€ jwt.py # Token & JWT analysis β”‚ └── headers.py # Security header checks β”œβ”€β”€ reports/ β”‚ └── generator.py # Structured report generation └── requirements.txt
βš™οΈ Installation Prerequisites

Python 3.9+

Playwright (browser-level behavior analysis)

Install Dependencies pip install -r requirements.txt playwright install chromium

πŸ”§ Configuration Optional: Enable AI-Assisted Analysis export OPENAI_API_KEY="your-api-key"

If not set, the scanner runs using deterministic logic only.

▢️ Running the Scanner uvicorn app:app --reload --host 0.0.0.0 --port 8000

Service URL:

http://localhost:8000

πŸ“‘ Example Scan Request curl -X POST "http://localhost:8000/api/scan/url" \ -H "Content-Type: application/json" \ -d '{ "target": "https://httpbin.org", "scan_type": "full", "max_depth": 2 }'
πŸ“„ Output

Each scan includes:

Affected endpoint

Vulnerability classification

Reproduction logic

Impact assessment

Severity estimation

Remediation guidance

Designed for:

JSON output

PDF reports

Professional pentest delivery

βš–οΈ Ethical Use

🚨 This tool is intended only for educational and authorized security testing.

Do NOT scan systems without explicit permission from the owner.

Unauthorized use may be illegal.

About

An AI-assisted security scanner that detects real-world authentication, authorization, and logic vulnerabilities in web applications and APIs, and generates professional, human-readable security reports with exploitation insights and remediation guidance.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages