HackerAI Local Sandbox Client - Execute commands on your local machine
npm install @hackerai/localHackerAI Local Sandbox Client - Execute commands on your local machine from HackerAI.
``bash`
npx @hackerai/local@latest --token YOUR_TOKEN
Or install globally:
`bash`
npm install -g @hackerai/local
hackerai-local --token YOUR_TOKEN
`bash`
npx @hackerai/local@latest --token hsb_abc123 --name "My Laptop"
This pulls the pre-built HackerAI sandbox image (~3GB) - an AI Agent Penetration Testing Environment based on Kali Linux with comprehensive automated tools including:
nmap, masscan, sqlmap, ffuf, gobuster, nuclei, hydra, nikto, wpscan, subfinder, httpx, smbclient, impacket, and many more.
`bash`
npx @hackerai/local@latest --token hsb_abc123 --name "Kali" --image kalilinux/kali-rolling
`bash`
npx @hackerai/local@latest --token hsb_abc123 --name "Work PC" --dangerous
Warning: Dangerous mode runs commands directly on your host OS without isolation.
| Option | Description |
| ------------------ | ------------------------------------------------------ |
| --token TOKEN | Authentication token from HackerAI Settings (required) |--name NAME
| | Connection name shown in HackerAI (default: hostname) |--image IMAGE
| | Docker image to use (default: hackerai/sandbox) |--dangerous
| | Run commands directly on host OS without Docker |--convex-url URL
| | Override backend URL (for development) |--help, -h
| | Show help message |
1. Go to HackerAI Settings
2. Navigate to the "Agents" tab
3. Click "Generate Token" or copy your existing token
- Docker Mode: Commands run in a container with process isolation, but with:
- Host network access (--network host) for pentesting tools to scan network servicesNET_RAW
- Linux capabilities for network tools:
- : Required for ping, nmap, masscan, hping3, arp-scan, tcpdump, raw socketsNET_ADMIN
- : Required for network interface manipulation, arp-scan, netdiscoverSYS_PTRACE`: Required for debugging tools (gdb, strace, ltrace)
-
- Dangerous Mode: Commands run directly on your OS without any isolation - use with caution
MIT