AI-powered personal development and network security agent with API testing and CVE database integration
npm install @feardread/fear-ai-agentSecurity AI Agent is a comprehensive command-line security testing and analysis framework built on Node.js. Version 2.3.0 provides an integrated suite of tools for security scanning, code analysis, vulnerability assessment, and AI-powered security intelligence.
- File System Browser: Navigate and inspect files directly from the command line
- AI-Powered Analysis: Integrate with multiple AI providers (Anthropic Claude, OpenAI GPT, Google Gemini)
- Security Scanning: Network port scanning, dependency checking, and security audits
- Code Analysis: Automated code review and project analysis
- Traffic Monitoring: Real-time network traffic monitoring and statistics
- CVE Database: Search and analyze Common Vulnerabilities and Exposures
- API Testing: Test and validate API endpoints and collections
- Code Refactoring: Automated code refactoring with AI assistance
- Web Scraping: Extract and analyze web content and security headers
- Vulnerability Assessment: Comprehensive vulnerability scanning and reporting
- Card Validation: Credit card number format validation and BIN analysis
- Cryptocurrency Tools: Real-time crypto price checking and rate comparisons
- Code Conversion: Convert HTML and jQuery to React components
The agent supports three AI providers with seamless switching:
- Anthropic Claude (Default: Claude Sonnet 4.5)
- OpenAI GPT
- Google Gemini (with streaming support)
``bash`
npm install
- readline (built-in)
- fs (built-in)
- path (built-in)
- Custom modules in ./modules directory
Set API keys via environment variables for automatic configuration:
`bash`
export ANTHROPIC_API_KEY="your-anthropic-key"
export OPENAI_API_KEY="your-openai-key"
export GOOGLE_API_KEY="your-google-key"
export AI_PROVIDER="anthropic" # Set default provider
export NO_COLOR=1 # Disable colored output
export DEBUG=1 # Enable verbose debugging
Configure AI providers at runtime:
`bash`
ai-setup anthropic YOUR_API_KEY
ai-setup openai YOUR_API_KEY
ai-setup google YOUR_API_KEY
- help - Display all available commandsstatus
- - Show system and module statushistory
- - View command history (last 20 commands)version
- - Display version informationtips
- - Show tips, shortcuts, and example workflowsbanner
- - Display the application bannerclear
- - Clear the screenexit
- - Exit the application
- ls - List files and directoriescd
- - Change directorypwd
- - Show current directory pathcat
- - Display file contentsless
- - View file with paginationfind
- - Search for files matching patternfile-info
- - Show detailed file informationtree
- - Display directory tree structurebookmark
- - Manage directory bookmarksbrowse-help
- - Show file browser help
- ai-setup - Configure AI providerai-provider
- - Switch between AI providersai-status
- - Show AI module configuration statusai-help
- - Display detailed AI command documentation
- ai-analyze - Perform AI security analysis on code fileai-batch
- - Batch analyze multiple filesai-compare
- - Compare two code versionsai-scan
- - Quick security scan
- ai-threat - Comprehensive threat assessmentai-explain
- - Explain vulnerability or CWE details
- ai-generate - Generate secure Node.js code
- ai-improve - Get security recommendations for project
- ai-chat - Start interactive AI chat sessionai-ask
- - Quick AI questionai-clear-history
- - Clear chat conversation history
- scan-ports - Scan network ports on target hostnetwork-info
- - Display network informationcheck-deps
- - Check project dependenciessecurity-audit
- - Run comprehensive security audit
- analyze-code - Analyze code file for issuesanalyze-project
- - Analyze entire project
- monitor-traffic - Start network traffic monitoringstop-monitor
- - Stop traffic monitoringtraffic-stats
- - Show traffic statisticsexport-traffic
- - Export traffic data to file
- search-cve - Search CVE databasecheck-cwe
- - Check CWE (Common Weakness Enumeration) detailscheck-package
- - Check package for known vulnerabilitiescheck-exploits
- - Search for known exploitsscan-deps
- - Scan project dependencies for CVEsexport-cve
- - Export CVE report
- test-endpoint - Test API endpointtest-collection
- - Test API collection from fileexport-report
- - Export test results report
- refactor-file - Refactor JavaScript filerefactor-project
- - Refactor entire projectanalyze-refactor
- - Analyze code for refactoring opportunitiescompare-refactor
- - Compare refactored versions
- scrape - Scrape webpage contentscrape-links
- - Extract all links from webpagescrape-images
- - Extract all images from webpageexport-scrape
- - Export scraped data to fileanalyze-headers
- - Analyze security headers
- vuln-assess - Run vulnerability assessmentexport-vuln
- - Export vulnerability results
- validate-card - Validate card number formatvalidate-batch
- - Batch validate card numbersanalyze-bin
- - Analyze Bank Identification Numbershow-test-cards
- - Display official test card numbersexplain-algorithm
- - Explain validation algorithms (Luhn, etc.)card-security-report
- - Generate card security reportcheck-card-status
- - Check single card payment statuscheck-card-batch
- - Check batch card payment statusconfigure-card-checker
- - Configure card checker settingscard-checker-help
- - Show card checker help
- compare-rates - Compare rates across exchangescrypto-price
- - Get cryptocurrency current pricetrack-portfolio
- - Track multiple cryptocurrenciescrypto-convert
- - Convert between cryptocurrenciesmarket-summary
- - Show cryptocurrency market summaryexport-rates
- - Export rates to filecrypto-help
- - Show cryptocurrency commands help
- html-to-react - Convert HTML file to React componentbatch-convert
- - Batch convert HTML filesanalyze-html
- - Analyze HTML structurejquery-to-react
- - Convert jQuery code to Reactjq-batch-convert
- - Batch convert jQuery filesanalyze-jquery
- - Analyze jQuery code structure
`bash`
FEAR >> ls
FEAR >> cd src
FEAR >> pwd
FEAR >> cat config.js
FEAR >> find *.js
`bash`
FEAR >> ai-setup anthropic sk-ant-xxxxx
FEAR >> ai-analyze vulnerable.js
FEAR >> ai-threat myapp
FEAR >> ai-improve .
`bash`
FEAR >> security-audit
FEAR >> scan-deps
FEAR >> search-cve CVE-2024-1234
FEAR >> ai-explain CVE-2024-1234
`bash`
FEAR >> analyze-code old.js
FEAR >> refactor-file old.js
FEAR >> ai-compare old.js old.refactored.js
`bash`
FEAR >> ai-chat
AI Chat > Explain SQL injection vulnerabilities
AI Chat > /history
AI Chat > /save security-notes.txt
AI Chat > /exit
`bash`
FEAR >> search-cve authentication
FEAR >> check-package express
FEAR >> ai-threat authentication-bypass
FEAR >> export-cve vulnerability-report.json
- TAB - Command autocomplete
- Up/Down Arrows - Navigate command history
- Ctrl+C - Cancel current operation
- Ctrl+D - Exit application
- Maintains last 100 commands
- View with history command
- Navigate with arrow keys
Press TAB to autocomplete commands. If multiple matches exist, all options will be displayed.
The agent uses a modular architecture with the following structure:
``
modules/
├── utils/
│ ├── browser.js # File system browser
│ └── colorizer.js # Terminal output formatting
├── security/
│ ├── scanner.js # Network scanning
│ ├── web.js # Web scraping
│ ├── vulnerability.js # Vulnerability assessment
│ ├── monitor.js # Traffic monitoring
│ └── cve.js # CVE database
├── ai/
│ └── ai.js # AI integration
├── code/
│ ├── analyzer.js # Code analysis
│ ├── refactor.js # Code refactoring
│ ├── react.js # HTML to React
│ └── jquery.js # jQuery to React
├── analyze/
│ └── api.js # API testing
├── ccard/
│ ├── validator.js # Card validation
│ └── checker.js # Card status checking
└── crypto/
└── exchange.js # Cryptocurrency tools
- Store API keys in environment variables, never in code
- Use ai-status to verify configuration before running analysessecurity-audit
- Export reports regularly for audit trails
- Run before deploying applications
- Use batch commands for multiple file operations
- Clear AI chat history periodically with ai-clear-history
- Export large datasets to files rather than viewing in terminal
- Bookmark frequently accessed directories
- Use command history for repeated operations
- Configure default AI provider via environment variable
- Create shell aliases for common command sequences
If a module shows [UNAVAILABLE] status:
1. Check that all dependencies are installed
2. Verify module file exists in correct path
3. Enable DEBUG mode: DEBUG=1 node agent.js
`bash`
FEAR >> ai-status # Check current configuration
FEAR >> ai-setup anthropic YOUR_KEY # Reconfigure
FEAR >> ai-help # View detailed AI documentation
`bash`
FEAR >> help # View all available commands
FEAR >> browse-help # View file browser commands
FEAR >> ai-help # View AI commands
Current Version: 2.3.0
Node.js Requirements: Compatible with Node.js 12.x and higher
Platform Support: Cross-platform (Windows, macOS, Linux)
This is a security testing framework intended for authorized security assessments and educational purposes only. Always obtain proper authorization before testing systems you do not own.
For issues, questions, or feature requests, consult the following resources:
- Run help for command referencetips
- Run for usage examples and workflowsai-help` for AI-specific documentation
- Run
- Enable DEBUG mode for verbose error output