Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
117 commits
Select commit Hold shift + click to select a range
9c8316d
add agentscan api
Jan 8, 2026
c311687
add agent scan framework
Jan 13, 2026
e97637a
change agent-scan
Jan 13, 2026
f50226c
add agent scan framework
Jan 13, 2026
00a2f0e
add main and ssrf agent
Jan 13, 2026
1876d89
Optimize prompt directory settings
Jan 13, 2026
70816b3
Optimize prompt directory settings
Jan 13, 2026
9a5e1d9
add skills tools
Jan 14, 2026
c83e409
Add data leakage detection skill and associated tools
rocie799 Jan 15, 2026
51e679f
Add agent security reviewer and report generation capabilities
rocie799 Jan 16, 2026
268d0c6
add agent adapter tools
y3oZ Jan 16, 2026
c74c803
add config-scanner agent
y3oZ Jan 16, 2026
e20c06d
Refactor severity classification across security modules
rocie799 Jan 16, 2026
d4680fb
Merge pull request #185 from YiZoey/v4
boy-hack Jan 19, 2026
52352c2
Separate agent provider
Jan 19, 2026
50aec26
add dispatcher testcase
Jan 19, 2026
58c20f3
add dialogue tool
Jan 19, 2026
96ff903
Optimize tool auto-addressing loading
Jan 19, 2026
c7c10d4
Optimize agent and base_agent
Jan 20, 2026
f8367ef
Refactor agent security reviewer and data leakage detection
rocie799 Jan 20, 2026
f442a3a
update agent scan README.md
Jan 20, 2026
2713fe8
add vulnerability detctor agent
Jan 20, 2026
8ad6ab7
update agent
Jan 20, 2026
176f15b
add tool dialogue
Jan 20, 2026
4f554d2
update tool dialogue & configuration scan
y3oZ Jan 20, 2026
cf1de00
Merge pull request #187 from YiZoey/v4
boy-hack Jan 21, 2026
c710731
update project_summary
Jan 21, 2026
c369e04
update subagent
Jan 21, 2026
95b4be7
glob tool rename glob_tool
Jan 21, 2026
086176a
update testcase run_task
Jan 21, 2026
f26d2b9
Add agent security review report and enhance logging
rocie799 Jan 21, 2026
506d51a
update subagent
Jan 21, 2026
5d2d26a
update test_dispatcher
Jan 22, 2026
7d46856
Remove deprecated security report XML and update agent security revie…
rocie799 Jan 22, 2026
1587028
skill bugfix
Jan 22, 2026
394812e
Remove unused 'context' parameter from data leakage scan schema to st…
rocie799 Jan 22, 2026
927cdc5
Remove agent security review report XML file.
rocie799 Jan 22, 2026
cf16207
update configuration scan task prompt
y3oZ Jan 22, 2026
3b77b3d
Refactor agent security and data leakage detection skills
rocie799 Jan 22, 2026
f73641f
base agent bugfix
Jan 23, 2026
7eb4c1f
Enhance data leakage detection and reporting framework
rocie799 Jan 23, 2026
149874c
Refactor agent security reporting and enhance data leakage detection
rocie799 Jan 26, 2026
9c17c9b
fix(dialogue): correct description of dialogue and scan tool
y3oZ Jan 27, 2026
9c7be6d
feat(logging): add line numbers and fix filename
y3oZ Jan 27, 2026
d5c6d68
feat(connect): add connectivity test client
y3oZ Jan 27, 2026
69a11f5
feat(config): add configuration file template
y3oZ Jan 27, 2026
299089c
fix(logging): correct import path for logger in multiple files
rocie799 Jan 29, 2026
44572be
add agent router
Jan 29, 2026
428a61a
评分runner.py中CalcSecScore方法修正(如果危害等级为中文仍能正确计算分数),已提issue
Jan 7, 2026
76eb07c
评分runner.py中CalcSecScore方法修正(更正item.RiskType为item.Severity)
Jan 7, 2026
865c89a
Refactor User struct and enhance user management methods
boy-hack Jan 8, 2026
fd2c13a
remove test info
Jan 8, 2026
72b5088
mcp meta result add llm parameter
Jan 9, 2026
5c3861a
fix llm model database
Jan 9, 2026
88d565a
inner api auth controller
Jan 9, 2026
23fa316
feat: add SYS_ADMIN capability for Chrome sandbox and database indexe…
Jan 9, 2026
e548e1d
feat:update feature and pager
zonalalala Jan 14, 2026
e4d6184
update api docs
Jan 15, 2026
e32265f
update swag docs
Jan 15, 2026
754f5e2
update model api
Jan 15, 2026
9590ccc
update version v3.6.0
Jan 15, 2026
757c8d0
update docker-compose.yml
Jan 15, 2026
ae3aaf7
update docker-compose.images.yml
Jan 15, 2026
70aa99d
resolve text misalignment in pdf report download; update user guide f…
zonalalala Jan 16, 2026
3070918
update changelog
Jan 17, 2026
7666e9d
add clawdbot fingerprint
Jan 27, 2026
0fc2c69
update v3.6.1
Jan 27, 2026
97e8e1b
Revise news section for A.I.G version updates
nicky-agent Jan 27, 2026
eba53cd
Update news section in README_ZH.md
nicky-agent Jan 27, 2026
ca2dd95
feat:add new user to readme
test0Emma Jan 28, 2026
5bce025
update dockerfile
Jan 29, 2026
1dfb3b2
bugfix for agent template
Jan 29, 2026
c365bf5
dispatchTask for Agent-Scan
Jan 29, 2026
d37902f
1. Refactor skill documentation to remove ASI identifiers and improve…
rocie799 Jan 29, 2026
24ef0dd
chunk file upload
Jan 30, 2026
4200f1e
feat(config): update config json file(extra icon)
y3oZ Jan 30, 2026
2827fa4
feat(adapter): remove coze bot_id from id
y3oZ Jan 30, 2026
5bf29a5
add validatePathSafety
Jan 30, 2026
9dc363f
fix mcp error: exit status 1
Jan 30, 2026
cf87708
feat(config): update config json file (icon)
y3oZ Feb 2, 2026
ee176e1
commit agent task
Feb 2, 2026
490c06b
fix(config): fix config json file(icon type)
y3oZ Feb 2, 2026
2c081c6
fix agent scan params error
Feb 2, 2026
6d4a7e6
fix agent scan params error
Feb 2, 2026
a5ddbae
feat(config): improve parsing compatibility for config files
y3oZ Feb 2, 2026
e5e412a
feat(adapter): improve compatibility of format validation
y3oZ Feb 2, 2026
4841af9
feat(report): refactor report generation and introduce new models for…
rocie799 Feb 3, 2026
da56b7a
fix agentscan router and update dockerfile
Feb 3, 2026
4f825e8
fix(config): fix header and dify inputs json type
y3oZ Feb 3, 2026
5a04b97
feat(coze): enable coze streaming response and parsing
y3oZ Feb 3, 2026
8cbe623
feat(adapter): propagate error messages
y3oZ Feb 3, 2026
8ae95d2
add muti-user agent config
Feb 3, 2026
dbd9400
fix: add missing username parameter to readAgentConfigContent call
Feb 3, 2026
eb9bde8
feat(adapter): propagate error messages
y3oZ Feb 3, 2026
2113482
warp traceback for agent-scan and mcp-scan
Feb 3, 2026
5ea1ad2
fix try except for test_client_connect.py
Feb 3, 2026
f11ecd5
feat(adapter): add support for Knot and TJ Coze
y3oZ Feb 4, 2026
5a7aafa
feat(config): add config for Knot and TJ Coze
y3oZ Feb 4, 2026
1e38fa4
feat(agent): enhance scan pipeline with dialogue count tracking and t…
rocie799 Feb 4, 2026
0aac038
fix base_agent handle no tool not logger
Feb 4, 2026
2a0f513
feat(agent): extract agent_name from provider configuration
rocie799 Feb 5, 2026
4243750
feat(config): update config json file
y3oZ Feb 5, 2026
d114981
docs(agent_security_reviewer): clarify handling of "no vulnerabilitie…
rocie799 Feb 5, 2026
e61f8d3
refactor(adapter): restructure field hierarchy
y3oZ Feb 5, 2026
8bca71a
feat(report): update risk type handling in security report generation
rocie799 Feb 5, 2026
e030bc3
fix minor bug
Feb 5, 2026
619d935
fix(config): move icon path
y3oZ Feb 5, 2026
4c21835
feat(config): add venus dify
y3oZ Feb 5, 2026
0d493cb
refactor(config & adapter): remove idSuffix field and update related …
y3oZ Feb 6, 2026
c46c7f5
feat(config): update label placeholder
y3oZ Feb 6, 2026
5778846
feat(prompt_manager): add method to strip YAML frontmatter from templ…
rocie799 Feb 9, 2026
1650599
feat(agent): enhance user message localization and update report gene…
rocie799 Feb 10, 2026
6649243
refactor(agent): adjust max iterations and enhance instruction locali…
rocie799 Feb 10, 2026
3b65b81
feat(agent): enhance language support and sensitive information detec…
rocie799 Feb 27, 2026
7becb24
feat(agent): implement async processing and enhance vulnerability det…
rocie799 Feb 27, 2026
bc58a1d
refactor(agent): streamline tool invocation parsing and enhance dialo…
rocie799 Feb 28, 2026
3b11bfe
refactor(agent): enhance language localization and update documentation
rocie799 Mar 2, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,38 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [v3.6.1] - 2026-01-27

### Added
- 🆔 **Component Fingerprints**: Added Clawdbot Gateway fingerprint to improve AI component vulnerability detection coverage.

## [v3.6.0] - 2025-01-17

### Added
- 🔐 **System Administration**: Added SYS_ADMIN capability for Chrome sandbox and database indexes for performance enhancement (@zhuque)
- 📊 **Report Enhancement**: Updated feature and pager, resolved text misalignment in PDF report download (@zonashi)
- 📝 **User Guide**: Updated user guide for new features (@zonashi)
- ⏱️ **Scan Metrics**: Added model & scan duration in AI tool protocol scan report (@zonashi)
- 👥 **User Management**: Refactored User struct and enhanced user management methods (@boyhack)

### Changed
- 📚 **Documentation**: Updated API docs, Swagger docs, and model API (@zhuque)
- 🐳 **Docker Config**: Updated docker-compose.yml and docker-compose.images.yml (@zhuque)
- 🔢 **Versioning**: Updated version to v3.6.0 (@zhuque)
- 🧠 **LLM Result**: Added LLM parameter to MCP meta result (@zhuque)
- 🗄️ **Database**: Fixed LLM model database (@zhuque)
- 🔐 **Auth**: Implemented inner API auth controller (@zhuque)
- 🎯 **Score Correction**: Corrected CalcSecScore method in runner.py to handle Chinese risk levels correctly (@mhh)
- ⚖️ **Risk Type**: Corrected item.RiskType to item.Severity in scoring logic (@mhh)

### Fixed
- 🧪 **Testing**: Removed test info (@zhuque)

### Contributors
Special thanks to @mhh, @aaasven

---

## [v3.6.0-rc1] - 2025-01-07

### Changed
Expand Down
20 changes: 16 additions & 4 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# 多阶段构建Dockerfile
# 第一阶段:构建阶段
# 第一阶段:构建Go应用
FROM golang:1.23.2-alpine AS builder

# 设置工作目录
Expand All @@ -17,11 +17,18 @@ RUN go mod download
# 构建应用
RUN CGO_ENABLED=0 GOOS=linux go build -ldflags="-s -w" -trimpath -buildvcs=false -o ai-infra-guard ./cmd/cli/main.go

# 第二阶段:运行阶段
FROM alpine:3.19
# 第二阶段:运行阶段(使用Python 3.12 Alpine镜像)
FROM python:3.12-alpine

# 安装运行时依赖
RUN apk add --no-cache ca-certificates tzdata bash curl
RUN apk add --no-cache \
ca-certificates \
tzdata \
bash \
curl

# 安装uv到/usr/local/bin
RUN curl -LsSf https://astral.sh/uv/install.sh | env UV_INSTALL_DIR="/usr/local/bin" sh

# 设置工作目录
WORKDIR /app
Expand All @@ -34,6 +41,10 @@ COPY --from=builder /app/CHANGELOG.md .
# 复制数据文件到容器中
COPY --from=builder /app/data ./data

# 复制agent-scan目录并安装Python依赖
COPY ./agent-scan /app/agent-scan
RUN pip install --no-cache-dir -r /app/agent-scan/requirements.txt

# 复制启动脚本到镜像中
COPY start.sh /app/start.sh
RUN chmod +x /app/start.sh && chown root:root /app/start.sh
Expand All @@ -51,6 +62,7 @@ ENV APP_ENV=production
ENV UPLOAD_DIR=/app/uploads
ENV DB_PATH=/app/db/tasks.db
ENV TZ=Asia/Shanghai
ENV PYTHONUNBUFFERED=1

# 暴露端口
EXPOSE 8088
Expand Down
5 changes: 5 additions & 0 deletions Dockerfile_Agent
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,11 @@ COPY ./mcp-scan /app/mcp-scan/
WORKDIR /app/mcp-scan
RUN pip install --no-cache-dir -r requirements.txt

COPY ./agent-scan /app/agent-scan/
WORKDIR /app/agent-scan
RUN pip install --no-cache-dir -r requirements.txt


RUN set -eux; \
apt-get purge -y --auto-remove \
build-essential \
Expand Down
35 changes: 20 additions & 15 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,9 @@
<br>

> 📢 **News**:
> * A.I.G v3.5.0 features major improvements in modular architecture, system stability, and detection capabilities. Update now to explore the new version. [View all changelog.](./CHANGELOG.md)
> * 🎉 A.I.G was featured at **Black Hat Arsenal Europe 2025**! Check out our [presentation slides.](./Arsenal-BHEU2025-AI-Infra-Guard.pdf)

> * A.I.G v3.6.1 Support Clawdbot(moltbot) Gateway unauthorized access risk detection. [View all changelog.](./CHANGELOG.md)
> * A.I.G v3.6.0 Add Agent Skills security scan to AI Tool Protocol scan. [View all changelog.](./CHANGELOG.md)

## Table of Contents
- [🚀 Quick Start](#-quick-start)
Expand Down Expand Up @@ -86,7 +87,7 @@ Once the service is running, you can access the A.I.G web interface at:
<br>

<details>
<summary><strong>📦 More installation options and online pro version</strong></summary>
<summary><strong>📦 More installation options</strong></summary>

### Other Installation Methods

Expand All @@ -109,18 +110,19 @@ Note: The AI-Infra-Guard project is positioned as an AI red teaming platform for

For more information, see: [https://tencent.github.io/AI-Infra-Guard/?menu=getting-started](https://tencent.github.io/AI-Infra-Guard/?menu=getting-started)

### Try the Online Pro Version
Experience the Pro version with advanced features and improved performance. The Pro version requires an invitation code and is prioritized for contributors who have submitted issues, pull requests, or discussions, or actively help grow the community. Visit: [https://aigsec.ai/](https://aigsec.ai/)

</details>

### Try the Online Pro Version
Experience the Pro version with advanced features and improved performance. The Pro version requires an invitation code and is prioritized for contributors who have submitted issues, pull requests, or discussions, or actively help grow the community. Visit: [https://aigsec.ai/](https://aigsec.ai/).
<br>
<br>

## ✨ Features

| Feature | More Info |
|:--------|:------------|
| **AI&nbsp;Infra&nbsp;Scan** | Precisely identifies ​over​ 30 AI framework components ​and covers​ over 400 known CVE vulnerabilities, ​including​ Ollama, ComfyUI, vLLM, etc. |
| **MCP&nbsp;Server&nbsp;Scan** | Powered by AI Agent, Detects 9 major categories of MCP security risks, Supports source code/remote URL scanning. |
| **AI&nbsp;Tool&nbsp;Protocol&nbsp;Scan** | Powered by an AI Agent, Detects 14 major categories of security risks in MCP Servers and Skills, Supports scanning of source code and remote URLs. |
| **Jailbreak&nbsp;Evaluation** | Assesses prompt security risks with curated datasets and multiple attack methods, Cross-model comparison. |

<details>
Expand Down Expand Up @@ -318,6 +320,7 @@ We are deeply grateful to the following teams and organizations for their trust,
<div align="center">
<img src="img/tencent.png" alt="Tencent" height="30px">
<img src="img/deepseek.png" alt="DeepSeek" height="38px">
<img src="img/antintl.svg" alt="Antintl" height="45px">
</div>

<br>
Expand Down Expand Up @@ -376,15 +379,17 @@ If you use A.I.G in your research, please cite:

We are deeply grateful to the research teams who have used A.I.G in their academic work and contributed to advancing AI security research:

[1] Yongjian Guo, Puzhuo Liu, et al. **"Systematic Analysis of MCP Security."** arXiv preprint arXiv:2508.12538 (2025). [[pdf]](https://arxiv.org/abs/2508.12538)
[2] Zexin Wang, Jingjing Li, et al. **"A Survey on AgentOps: Categorization, Challenges, and Future Directions."** arXiv preprint arXiv:2508.02121 (2025). [[pdf]](https://arxiv.org/abs/2508.02121)
[3] Yixuan Yang, Daoyuan Wu, Yufan Chen. **"MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols."** arXiv preprint arXiv:2508.13220 (2025). [[pdf]](https://arxiv.org/abs/2508.13220)
[4] Ping He, Changjiang Li, et al. **"Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools."** arXiv preprint arXiv:2509.21011 (2025). [[pdf]](https://arxiv.org/abs/2509.21011)
[5] Weibo Zhao, Jiahao Liu, Bonan Ruan et al. **"When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation."** arXiv preprint arXiv:2509.24272v1 (2025). [[pdf]](http://arxiv.org/abs/2509.24272v1)
[1] Ruiqi Li, Zhiqiang Wang, Yunhao Yao et al. **"MCP-ITP: An Automated Framework for Implicit Tool Poisoning in MCP."** arXiv preprint arXiv:2601.07395v1 (2026). [[pdf]](http://arxiv.org/abs/2601.07395v1)
[2] Jingxiao Yang, Ping He, Tianyu Du et al. **"HogVul: Black-box Adversarial Code Generation Framework Against LM-based Vulnerability Detectors."** arXiv preprint arXiv:2601.05587v1 (2026). [[pdf]](http://arxiv.org/abs/2601.05587v1)
[3] Yunyi Zhang, Shibo Cui, Baojun Liu et al. **"Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries."** arXiv preprint arXiv:2511.17874v2 (2025). [[pdf]](http://arxiv.org/abs/2511.17874v2)
[4] Teofil Bodea, Masanori Misono, Julian Pritzi et al. **"Trusted AI Agents in the Cloud."** arXiv preprint arXiv:2512.05951v1 (2025). [[pdf]](http://arxiv.org/abs/2512.05951v1)
[5] Christian Coleman. **"Behavioral Detection Methods for Automated MCP Server Vulnerability Assessment."** [[pdf]](https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1138&context=covacci-undergraduateresearch)
[6] Bin Wang, Zexin Liu, Hao Yu et al. **"MCPGuard : Automatically Detecting Vulnerabilities in MCP Servers."** arXiv preprint arXiv:22510.23673v1 (2025). [[pdf]](http://arxiv.org/abs/2510.23673v1)
[7] Christian Coleman. **"Behavioral Detection Methods for Automated MCP Server Vulnerability Assessment."** [[pdf]](https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1138&context=covacci-undergraduateresearch)
[8] Teofil Bodea, Masanori Misono, Julian Pritzi et al. **"Trusted AI Agents in the Cloud."** arXiv preprint arXiv:2512.05951v1 (2025). [[pdf]](http://arxiv.org/abs/2512.05951v1)
[9] Yunyi Zhang, Shibo Cui, Baojun Liu et al. **"Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries."** arXiv preprint arXiv:2511.17874v2 (2025). [[pdf]](http://arxiv.org/abs/2511.17874v2)
[7] Weibo Zhao, Jiahao Liu, Bonan Ruan et al. **"When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation."** arXiv preprint arXiv:2509.24272v1 (2025). [[pdf]](http://arxiv.org/abs/2509.24272v1)
[8] Ping He, Changjiang Li, et al. **"Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools."** arXiv preprint arXiv:2509.21011 (2025). [[pdf]](https://arxiv.org/abs/2509.21011)
[9] Yixuan Yang, Daoyuan Wu, Yufan Chen. **"MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols."** arXiv preprint arXiv:2508.13220 (2025). [[pdf]](https://arxiv.org/abs/2508.13220)
[10] Zexin Wang, Jingjing Li, et al. **"A Survey on AgentOps: Categorization, Challenges, and Future Directions."** arXiv preprint arXiv:2508.02121 (2025). [[pdf]](https://arxiv.org/abs/2508.02121)
[11] Yongjian Guo, Puzhuo Liu, et al. **"Systematic Analysis of MCP Security."** arXiv preprint arXiv:2508.12538 (2025). [[pdf]](https://arxiv.org/abs/2508.12538)

📧 If you have used A.I.G in your research or product, or if we have inadvertently missed your publication, we would love to hear from you! [Contact us here](#-join-the-community).
<br>
Expand Down
36 changes: 19 additions & 17 deletions README_ZH.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,9 +48,9 @@
</p>

> 📢 **News**:
> * A.I.G V3.5.0 正式版在架构模块化、系统稳定性及检测能力上进行了全面升级,欢迎大家更新体验。[查看完整更新日志](./CHANGELOG.md)
> * 🎉 A.I.G 入选 **Black Hat Arsenal Europe 2025**! 查看我们的[PPT](./Arsenal-BHEU2025-AI-Infra-Guard.pdf)。

> * A.I.G V3.6.1 新增支持 clawdbot(moltbot) 网关未授权访问风险检测能力。[查看完整更新日志](./CHANGELOG.md)
> * A.I.G v3.6.0 在AI工具协议扫描中新增了 Agent Skills 安全风险评估能力。[查看完整更新日志](./CHANGELOG.md)
## 目录
- [🚀 快速开始](#-快速开始)
- [✨ 功能特性](#-功能特性)
Expand Down Expand Up @@ -84,7 +84,7 @@ docker-compose -f docker-compose.images.yml up -d
<br>

<details>
<summary><strong>📦 更多安装方式及在线Pro版</strong></summary>
<summary><strong>📦 更多安装方式</strong></summary>

### 其他安装方式

Expand All @@ -107,12 +107,11 @@ docker-compose up -d

更多信息请参阅:[https://tencent.github.io/AI-Infra-Guard/?menu=getting-started](https://tencent.github.io/AI-Infra-Guard/?menu=getting-started)

### 体验在线Pro版
体验具有内测及高级功能的Pro版,需要邀请码,优先提供给提交过 Issues、Pull Requests 或 Discussions,或积极帮助社区发展的贡献者。访问:[https://aigsec.ai/](https://aigsec.ai/)

</details>
<br>

### 体验在线Pro版
体验具有内测及高级功能的Pro版,需要邀请码,优先提供给提交过 Issues、Pull Requests 或 Discussions,或积极帮助社区发展的贡献者。访问:[https://aigsec.ai/](https://aigsec.ai/)
<br/>
<br/>

## ✨ 功能特性
Expand All @@ -121,7 +120,7 @@ docker-compose up -d
| 特性 | 详细信息 |
|:--------|:------------|
| **AI基础设施漏洞扫描** | 精准识别30+AI框架组件,覆盖400+已知CVE漏洞,包括Ollama/ComfyUI/vLLM等 |
| **MCP Server风险检测** | 基于AI Agent驱动,检测9大类MCP安全风险,支持源代码/远程URL扫描 |
| **AI工具协议扫描** | 基于AI Agent驱动,检测14大类MCP Server与Skills安全风险,支持源代码/远程URL扫描 |
| **大模型安全体检** | 快速评估Prompt安全风险,内置多个精选越狱评估数据集,支持多种越狱攻击算子,跨模型安全性能对比 |

<details>
Expand Down Expand Up @@ -314,6 +313,7 @@ A.I.G 的核心能力之一就是其丰富且可快速配置的插件系统。
<div align="center">
<img src="img/tencent.png" alt="Tencent" height="30px">
<img src="img/deepseek.png" alt="DeepSeek" height="38px">
<img src="img/antintl.svg" alt="Antintl" height="45px">
</div>

<br>
Expand Down Expand Up @@ -369,15 +369,17 @@ A.I.G 的核心能力之一就是其丰富且可快速配置的插件系统。

我们深深感谢在学术工作中使用A.I.G,并为推进AI安全研究做出贡献的团队:

[1] Yongjian Guo, Puzhuo Liu, et al. **"Systematic Analysis of MCP Security."** arXiv preprint arXiv:2508.12538 (2025). [[pdf]](https://arxiv.org/abs/2508.12538)
[2] Zexin Wang, Jingjing Li, et al. **"A Survey on AgentOps: Categorization, Challenges, and Future Directions."** arXiv preprint arXiv:2508.02121 (2025). [[pdf]](https://arxiv.org/abs/2508.02121)
[3] Yixuan Yang, Daoyuan Wu, Yufan Chen. **"MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols."** arXiv preprint arXiv:2508.13220 (2025). [[pdf]](https://arxiv.org/abs/2508.13220)
[4] Ping He, Changjiang Li, et al. **"Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools."** arXiv preprint arXiv:2509.21011 (2025). [[pdf]](https://arxiv.org/abs/2509.21011)
[5] Weibo Zhao, Jiahao Liu, Bonan Ruan et al. **"When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation."** arXiv preprint arXiv:2509.24272v1 (2025). [[pdf]](http://arxiv.org/abs/2509.24272v1)
[1] Ruiqi Li, Zhiqiang Wang, Yunhao Yao et al. **"MCP-ITP: An Automated Framework for Implicit Tool Poisoning in MCP."** arXiv preprint arXiv:2601.07395v1 (2026). [[pdf]](http://arxiv.org/abs/2601.07395v1)
[2] Jingxiao Yang, Ping He, Tianyu Du et al. **"HogVul: Black-box Adversarial Code Generation Framework Against LM-based Vulnerability Detectors."** arXiv preprint arXiv:2601.05587v1 (2026). [[pdf]](http://arxiv.org/abs/2601.05587v1)
[3] Yunyi Zhang, Shibo Cui, Baojun Liu et al. **"Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries."** arXiv preprint arXiv:2511.17874v2 (2025). [[pdf]](http://arxiv.org/abs/2511.17874v2)
[4] Teofil Bodea, Masanori Misono, Julian Pritzi et al. **"Trusted AI Agents in the Cloud."** arXiv preprint arXiv:2512.05951v1 (2025). [[pdf]](http://arxiv.org/abs/2512.05951v1)
[5] Christian Coleman. **"Behavioral Detection Methods for Automated MCP Server Vulnerability Assessment."** [[pdf]](https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1138&context=covacci-undergraduateresearch)
[6] Bin Wang, Zexin Liu, Hao Yu et al. **"MCPGuard : Automatically Detecting Vulnerabilities in MCP Servers."** arXiv preprint arXiv:22510.23673v1 (2025). [[pdf]](http://arxiv.org/abs/2510.23673v1)
[7] Christian Coleman. **"Behavioral Detection Methods for Automated MCP Server Vulnerability Assessment."** [[pdf]](https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1138&context=covacci-undergraduateresearch)
[8] Teofil Bodea, Masanori Misono, Julian Pritzi et al. **"Trusted AI Agents in the Cloud."** arXiv preprint arXiv:2512.05951v1 (2025). [[pdf]](http://arxiv.org/abs/2512.05951v1)
[9] Yunyi Zhang, Shibo Cui, Baojun Liu et al. **"Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries."** arXiv preprint arXiv:2511.17874v2 (2025). [[pdf]](http://arxiv.org/abs/2511.17874v2)
[7] Weibo Zhao, Jiahao Liu, Bonan Ruan et al. **"When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation."** arXiv preprint arXiv:2509.24272v1 (2025). [[pdf]](http://arxiv.org/abs/2509.24272v1)
[8] Ping He, Changjiang Li, et al. **"Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools."** arXiv preprint arXiv:2509.21011 (2025). [[pdf]](https://arxiv.org/abs/2509.21011)
[9] Yixuan Yang, Daoyuan Wu, Yufan Chen. **"MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols."** arXiv preprint arXiv:2508.13220 (2025). [[pdf]](https://arxiv.org/abs/2508.13220)
[10] Zexin Wang, Jingjing Li, et al. **"A Survey on AgentOps: Categorization, Challenges, and Future Directions."** arXiv preprint arXiv:2508.02121 (2025). [[pdf]](https://arxiv.org/abs/2508.02121)
[11] Yongjian Guo, Puzhuo Liu, et al. **"Systematic Analysis of MCP Security."** arXiv preprint arXiv:2508.12538 (2025). [[pdf]](https://arxiv.org/abs/2508.12538)

📧 如果您在研究中使用了A.I.G,请联系我们,让更多人看到您的研究!
<br>
Expand All @@ -389,4 +391,4 @@ A.I.G 的核心能力之一就是其丰富且可快速配置的插件系统。

<div>

[![Star History Chart](https://api.star-history.com/svg?repos=Tencent/AI-Infra-Guard&type=Date)](https://star-history.com/#Tencent/AI-Infra-Guard&Date)
[![Star History Chart](https://api.star-history.com/svg?repos=Tencent/AI-Infra-Guard&type=Date)](https://star-history.com/#Tencent/AI-Infra-Guard&Date)
27 changes: 27 additions & 0 deletions agent-scan/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
# Agent-Scan

AI Agent 驱动的自动化代码扫描和漏洞检测工具

## 快速开始

```bash
# 安装依赖
pip install -r requirements.txt
# 运行扫描
python main.py -m deepseek/deepseek-v3.2 -k sk-123456 --agent_provider demo_dify.yaml
```

## 命令行参数

```bash
python main.py [选项]

可选参数:
--repo PATH 要扫描的项目路径
-p, --prompt TEXT 自定义扫描提示词
-m, --model TEXT LLM 模型名称 (默认: deepseek/deepseek-v3.2-exp)
-k, --api_key TEXT API Key (默认从环境变量 OPENROUTER_API_KEY 读取)
-u, --base_url TEXT API 基础 URL (默认: https://openrouter.ai/api/v1)
--agent_provider PATH Agent provider 配置文件
--language TEXT 输出语言 zh/en (默认: zh)
```
Loading