Open source · MIT licensed
Pentest your AI, code,
and supply chain
with autonomous agents
Five commands. Four AI agents. Scan LLM endpoints, audit npm packages, review source code, test MCP servers — then prove every finding is exploitable.
npx nightfang scan --target https://your-app.com/api/chat
One toolkit. Five attack surfaces.
From LLM endpoints to npm packages to git repos — nightfang finds what scanners miss.
LLM Endpoints
ChatGPT, Claude, Llama APIs, custom chatbots
MCP Servers
Tool schemas, validation, auth, poisoning
npm Packages
Supply chain, malicious code, dependency risk
Source Code
Local repos, GitHub URLs, deep AI audit
Web Apps
AI copilots, RAG pipelines, agent APIs
Five commands. Full coverage.
Each command is purpose-built for a different attack surface. Zero config, instant results.
Probe LLM endpoints & MCP servers
Discovers vulnerabilities in AI endpoints with 47+ test cases across prompt injection, jailbreaks, tool poisoning, data exfiltration, and more. Supports probe, deep, and MCP modes.
npx nightfang scan --target <url> Audit npm packages for malicious code
Installs a package in a sandbox, runs semgrep static analysis plus AI-powered code review. Catches supply chain attacks, backdoors, and dependency vulnerabilities.
npx nightfang audit <package> Deep security audit of source code
Security-focused code review of local repos or GitHub URLs. Multiple AI runtimes analyze your entire codebase and output SARIF, Markdown, and JSON reports.
npx nightfang review <repo> Query and inspect verified findings
Filter findings by severity, category, and status. Inspect individual findings with full evidence chains and proof artifacts. Track the lifecycle from discovered to confirmed.
npx nightfang findings list Browse past scan results
Query the local SQLite database for previous scans. See status, depth, findings count, and duration for every run. Track your security posture over time.
npx nightfang history One command, zero config
No YAML files. No Python environments. Just npx nightfang scan and you're running.
Zero false positives
Every finding is re-exploited with proof before it hits the report. No more triaging 200 "possible prompt injections."
$0.05 per CI scan
Quick scans in under a minute. Deep audits for $1. Cheaper than one hour of manual pentesting.
Four agents. One pipeline.
Each agent is specialized for a phase of the security audit. They work in sequence, building on each other's output.
Recon
Maps endpoints, model cards, system prompts, MCP tool schemas, and auth flows.
Offense
Runs prompt injection, jailbreaks, tool poisoning, data exfiltration, and more.
Validation
Re-exploits each finding to eliminate false positives. Captures proof artifacts.
Output
Generates SARIF, Markdown, and JSON reports with severity and remediation.
OWASP LLM Top 10 coverage
8 out of 10 categories covered. The most comprehensive open-source coverage available.
How it compares
The only open-source tool with autonomous multi-agent testing, verification, and full-stack coverage.
| Feature | Nightfang | promptfoo | garak | nuclei | Semgrep |
|---|---|---|---|---|---|
| Autonomous multi-agent | 4 agents | — | — | — | — |
| Verification (no false positives) | Re-exploits | — | — | — | — |
| LLM endpoint scanning | ✓ | ✓ | ✓ | — | — |
| MCP server security | ✓ | — | — | — | — |
| npm package audit | ✓ | — | — | — | Rules |
| Source code review | AI-powered | — | — | — | Rules |
| Web/API scanning | ✓ | — | — | ✓ | — |
| OWASP LLM Top 10 | 8/10 | Partial | Partial | — | — |
| Zero config | npx | YAML | Python | Templates | Config |
| Open source | MIT | OpenAI | OSS | MIT | LGPL |
Drops into your CI/CD
Findings show up directly in GitHub's Security tab.
name: AI Security Scan
on: [push, pull_request]
jobs:
nightfang:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Run Nightfang
uses: peaktwilight/nightfang-action@v1
with:
target: $${{ secrets.STAGING_API_URL }}
- name: Upload SARIF
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: nightfang-report/report.sarif Costs less than coffee
AI-powered security testing at a fraction of manual pentesting costs.
Built by a security researcher
Created by a researcher with 7 published CVEs across node-forge, uptime-kuma, liquidjs, picomatch, and jspdf — plus the creator of OpenSOAR and PhishMind.
Stop guessing.
Start proving.
Five commands. Real vulnerabilities. Proof of exploitability.
npx nightfang scan --target <url>
Star on GitHub