Skip to content

AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with intelligent fuzzing, AI-driven analysis, and a marketplace of security tools.

License

Unknown, Apache-2.0 licenses found

Licenses found

Unknown
LICENSE
Apache-2.0
LICENSE-APACHE
Notifications You must be signed in to change notification settings

FuzzingLabs/fuzzforge_ai

FuzzForge OSS

AI-Powered Security Research Orchestration via MCP

Discord License: BSL 1.1 Python 3.12+ MCP Compatible Website

Let AI agents orchestrate your security research workflows locally

Overview β€’ Features β€’ Installation β€’ Usage Guide β€’ Modules β€’ Contributing


🚧 FuzzForge OSS is under active development. Expect breaking changes and new features!


πŸš€ Overview

FuzzForge OSS is an open-source runtime that enables AI agents (GitHub Copilot, Claude, etc.) to orchestrate security research workflows through the Model Context Protocol (MCP).

The Core: Modules

At the heart of FuzzForge are modules - containerized security tools that AI agents can discover, configure, and orchestrate. Each module encapsulates a specific security capability (static analysis, fuzzing, crash analysis, etc.) and runs in an isolated container.

  • πŸ”Œ Plug & Play: Modules are self-contained - just pull and run
  • πŸ€– AI-Native: Designed for AI agent orchestration via MCP
  • πŸ”— Composable: Chain modules together into automated workflows
  • πŸ“¦ Extensible: Build custom modules with the Python SDK

The OSS runtime handles module discovery, execution, and result collection. Security modules (developed separately) provide the actual security tooling - from static analyzers to fuzzers to crash triagers.

Instead of manually running security tools, describe what you want and let your AI assistant handle it.

🎬 Use Case: Rust Fuzzing Pipeline

Scenario: Fuzz a Rust crate to discover vulnerabilities using AI-assisted harness generation and parallel fuzzing.

1️⃣ Analyze, Generate & Validate Harnesses 2️⃣ Run Parallel Continuous Fuzzing
FuzzForge Demo - Analysis Pipeline FuzzForge Demo - Parallel Fuzzing
AI agent analyzes code, generates harnesses, and validates they compile Multiple fuzzing sessions run in parallel with live metrics

⭐ Support the Project

If you find FuzzForge useful, please star the repo to support development! πŸš€

GitHub Stars

✨ Features

Feature Description
πŸ€– AI-Native Built for MCP - works with GitHub Copilot, Claude, and any MCP-compatible agent
πŸ“¦ Containerized Each module runs in isolation via Docker or Podman
πŸ”„ Continuous Mode Long-running tasks (fuzzing) with real-time metrics streaming
πŸ”— Workflows Chain multiple modules together in automated pipelines
πŸ› οΈ Extensible Create custom modules with the Python SDK
🏠 Local First All execution happens on your machine - no cloud required
πŸ”’ Secure Sandboxed containers with no network access by default

πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                     AI Agent (Copilot/Claude)                   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚ MCP Protocol (stdio)
                            β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                     FuzzForge MCP Server                        β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚list_modules β”‚  β”‚execute_moduleβ”‚  β”‚start_continuous_module β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
                            β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                     FuzzForge Runner                            β”‚
β”‚                  Container Engine (Docker/Podman)               β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
        β–Ό                   β–Ό                   β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Module A     β”‚   β”‚  Module B     β”‚   β”‚  Module C     β”‚
β”‚  (Container)  β”‚   β”‚  (Container)  β”‚   β”‚  (Container)  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ“¦ Installation

Prerequisites

Quick Install

# Clone the repository
git clone https://github.com/FuzzingLabs/fuzzforge_ai.git
cd fuzzforge_ai

# Install dependencies
uv sync

# Build module images
make build-modules

Configure MCP for Your AI Agent

# For GitHub Copilot
uv run fuzzforge mcp install copilot

# For Claude Code (CLI)
uv run fuzzforge mcp install claude-code

# For Claude Desktop (standalone app)
uv run fuzzforge mcp install claude-desktop

# Verify installation
uv run fuzzforge mcp status

Restart your editor and your AI agent will have access to FuzzForge tools!


πŸ“¦ Modules

FuzzForge modules are containerized security tools that AI agents can orchestrate. The module ecosystem is designed around a simple principle: the OSS runtime orchestrates, enterprise modules execute.

Module Ecosystem

FuzzForge OSS FuzzForge Enterprise Modules
What Runtime & MCP server Security research modules
License Apache 2.0 BSL 1.1 (Business Source License)
Compatibility βœ… Runs any compatible module βœ… Works with OSS runtime

Enterprise modules are developed separately and provide production-ready security tooling:

Category Modules Description
πŸ” Static Analysis Rust Analyzer, Solidity Analyzer, Cairo Analyzer Code analysis and fuzzable function detection
🎯 Fuzzing Cargo Fuzzer, Honggfuzz, AFL++ Coverage-guided fuzz testing
πŸ’₯ Crash Analysis Crash Triager, Root Cause Analyzer Automated crash deduplication and analysis
πŸ” Vulnerability Detection Pattern Matcher, Taint Analyzer Security vulnerability scanning
πŸ“ Reporting Report Generator, SARIF Exporter Automated security report generation

πŸ’‘ Build your own modules! The FuzzForge SDK allows you to create custom modules that integrate seamlessly with the OSS runtime. See Creating Custom Modules.

Execution Modes

Modules run in two execution modes:

One-shot Execution

Run a module once and get results:

result = execute_module("my-analyzer", assets_path="/path/to/project")

Continuous Execution

For long-running tasks like fuzzing, with real-time metrics:

# Start continuous execution
session = start_continuous_module("my-fuzzer", 
    assets_path="/path/to/project",
    configuration={"target": "my_target"})

# Check status with live metrics
status = get_continuous_status(session["session_id"])

# Stop and collect results
stop_continuous_module(session["session_id"])

πŸ› οΈ Creating Custom Modules

Build your own security modules with the FuzzForge SDK:

from fuzzforge_modules_sdk import FuzzForgeModule, FuzzForgeModuleResults

class MySecurityModule(FuzzForgeModule):
    def _run(self, resources):
        self.emit_event("started", target=resources[0].path)
        
        # Your analysis logic here
        results = self.analyze(resources)
        
        self.emit_progress(100, status="completed", 
            message=f"Analysis complete")
        return FuzzForgeModuleResults.SUCCESS

πŸ“– See the Module SDK Guide for details.


πŸ“ Project Structure

fuzzforge_ai/
β”œβ”€β”€ fuzzforge-cli/           # Command-line interface
β”œβ”€β”€ fuzzforge-common/        # Shared abstractions (containers, storage)
β”œβ”€β”€ fuzzforge-mcp/           # MCP server for AI agents
β”œβ”€β”€ fuzzforge-modules/       # Security modules
β”‚   └── fuzzforge-modules-sdk/   # Module development SDK
β”œβ”€β”€ fuzzforge-runner/        # Local execution engine
β”œβ”€β”€ fuzzforge-types/         # Type definitions & schemas
└── demo/                    # Demo projects for testing

πŸ—ΊοΈ What's Next

MCP Security Hub integration β€” Bridge 175+ offensive security tools (Nmap, Nuclei, Ghidra, and more) into FuzzForge workflows, all orchestrated by AI agents.

See ROADMAP.md for the full roadmap.


🀝 Contributing

We welcome contributions from the community!

  • πŸ› Report bugs via GitHub Issues
  • πŸ’‘ Suggest features or improvements
  • πŸ”§ Submit pull requests
  • πŸ“¦ Share your custom modules

See CONTRIBUTING.md for guidelines.


πŸ“„ License

BSL 1.1 - See LICENSE for details.


Built with ❀️ by FuzzingLabs

About

AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with intelligent fuzzing, AI-driven analysis, and a marketplace of security tools.

Topics

Resources

License

Unknown, Apache-2.0 licenses found

Licenses found

Unknown
LICENSE
Apache-2.0
LICENSE-APACHE

Contributing

Stars

Watchers

Forks