Let AI agents orchestrate your security research workflows locally
Overview β’ Features β’ Installation β’ Usage Guide β’ Modules β’ Contributing
π§ FuzzForge OSS is under active development. Expect breaking changes and new features!
FuzzForge OSS is an open-source runtime that enables AI agents (GitHub Copilot, Claude, etc.) to orchestrate security research workflows through the Model Context Protocol (MCP).
At the heart of FuzzForge are modules - containerized security tools that AI agents can discover, configure, and orchestrate. Each module encapsulates a specific security capability (static analysis, fuzzing, crash analysis, etc.) and runs in an isolated container.
- π Plug & Play: Modules are self-contained - just pull and run
- π€ AI-Native: Designed for AI agent orchestration via MCP
- π Composable: Chain modules together into automated workflows
- π¦ Extensible: Build custom modules with the Python SDK
The OSS runtime handles module discovery, execution, and result collection. Security modules (developed separately) provide the actual security tooling - from static analyzers to fuzzers to crash triagers.
Instead of manually running security tools, describe what you want and let your AI assistant handle it.
Scenario: Fuzz a Rust crate to discover vulnerabilities using AI-assisted harness generation and parallel fuzzing.
If you find FuzzForge useful, please star the repo to support development! π
| Feature | Description |
|---|---|
| π€ AI-Native | Built for MCP - works with GitHub Copilot, Claude, and any MCP-compatible agent |
| π¦ Containerized | Each module runs in isolation via Docker or Podman |
| π Continuous Mode | Long-running tasks (fuzzing) with real-time metrics streaming |
| π Workflows | Chain multiple modules together in automated pipelines |
| π οΈ Extensible | Create custom modules with the Python SDK |
| π Local First | All execution happens on your machine - no cloud required |
| π Secure | Sandboxed containers with no network access by default |
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AI Agent (Copilot/Claude) β
βββββββββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β MCP Protocol (stdio)
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β FuzzForge MCP Server β
β βββββββββββββββ ββββββββββββββββ ββββββββββββββββββββββββββ β
β βlist_modules β βexecute_moduleβ βstart_continuous_module β β
β βββββββββββββββ ββββββββββββββββ ββββββββββββββββββββββββββ β
βββββββββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β FuzzForge Runner β
β Container Engine (Docker/Podman) β
βββββββββββββββββββββββββββββ¬ββββββββββββββββββββββββββββββββββββββ
β
βββββββββββββββββββββΌββββββββββββββββββββ
βΌ βΌ βΌ
βββββββββββββββββ βββββββββββββββββ βββββββββββββββββ
β Module A β β Module B β β Module C β
β (Container) β β (Container) β β (Container) β
βββββββββββββββββ βββββββββββββββββ βββββββββββββββββ
- Python 3.12+
- uv package manager
- Docker (Install Docker) or Podman
# Clone the repository
git clone https://github.com/FuzzingLabs/fuzzforge_ai.git
cd fuzzforge_ai
# Install dependencies
uv sync
# Build module images
make build-modules# For GitHub Copilot
uv run fuzzforge mcp install copilot
# For Claude Code (CLI)
uv run fuzzforge mcp install claude-code
# For Claude Desktop (standalone app)
uv run fuzzforge mcp install claude-desktop
# Verify installation
uv run fuzzforge mcp statusRestart your editor and your AI agent will have access to FuzzForge tools!
FuzzForge modules are containerized security tools that AI agents can orchestrate. The module ecosystem is designed around a simple principle: the OSS runtime orchestrates, enterprise modules execute.
| FuzzForge OSS | FuzzForge Enterprise Modules | |
|---|---|---|
| What | Runtime & MCP server | Security research modules |
| License | Apache 2.0 | BSL 1.1 (Business Source License) |
| Compatibility | β Runs any compatible module | β Works with OSS runtime |
Enterprise modules are developed separately and provide production-ready security tooling:
| Category | Modules | Description |
|---|---|---|
| π Static Analysis | Rust Analyzer, Solidity Analyzer, Cairo Analyzer | Code analysis and fuzzable function detection |
| π― Fuzzing | Cargo Fuzzer, Honggfuzz, AFL++ | Coverage-guided fuzz testing |
| π₯ Crash Analysis | Crash Triager, Root Cause Analyzer | Automated crash deduplication and analysis |
| π Vulnerability Detection | Pattern Matcher, Taint Analyzer | Security vulnerability scanning |
| π Reporting | Report Generator, SARIF Exporter | Automated security report generation |
π‘ Build your own modules! The FuzzForge SDK allows you to create custom modules that integrate seamlessly with the OSS runtime. See Creating Custom Modules.
Modules run in two execution modes:
Run a module once and get results:
result = execute_module("my-analyzer", assets_path="/path/to/project")For long-running tasks like fuzzing, with real-time metrics:
# Start continuous execution
session = start_continuous_module("my-fuzzer",
assets_path="/path/to/project",
configuration={"target": "my_target"})
# Check status with live metrics
status = get_continuous_status(session["session_id"])
# Stop and collect results
stop_continuous_module(session["session_id"])Build your own security modules with the FuzzForge SDK:
from fuzzforge_modules_sdk import FuzzForgeModule, FuzzForgeModuleResults
class MySecurityModule(FuzzForgeModule):
def _run(self, resources):
self.emit_event("started", target=resources[0].path)
# Your analysis logic here
results = self.analyze(resources)
self.emit_progress(100, status="completed",
message=f"Analysis complete")
return FuzzForgeModuleResults.SUCCESSπ See the Module SDK Guide for details.
fuzzforge_ai/
βββ fuzzforge-cli/ # Command-line interface
βββ fuzzforge-common/ # Shared abstractions (containers, storage)
βββ fuzzforge-mcp/ # MCP server for AI agents
βββ fuzzforge-modules/ # Security modules
β βββ fuzzforge-modules-sdk/ # Module development SDK
βββ fuzzforge-runner/ # Local execution engine
βββ fuzzforge-types/ # Type definitions & schemas
βββ demo/ # Demo projects for testing
MCP Security Hub integration β Bridge 175+ offensive security tools (Nmap, Nuclei, Ghidra, and more) into FuzzForge workflows, all orchestrated by AI agents.
See ROADMAP.md for the full roadmap.
We welcome contributions from the community!
- π Report bugs via GitHub Issues
- π‘ Suggest features or improvements
- π§ Submit pull requests
- π¦ Share your custom modules
See CONTRIBUTING.md for guidelines.
BSL 1.1 - See LICENSE for details.
Built with β€οΈ by FuzzingLabs

