An AI-assisted, human-in-the-loop red-team agent for API security testing. Maps attack surfaces, fuzzes endpoints with curated payloads, evaluates responses, and generates OWASP-aligned reports through a role-based web UI.
RedTeam Agent is a full-stack web application that automates the red-team phase of API security testing. It combines a Python/FastAPI scanning engine with a React role-based UI, enabling security teams to discover, triage, and verify vulnerabilities with structured human oversight.
The agent pipeline ingests an API target, auto-discovers endpoints through OpenAPI/Swagger parsing or heuristic probing, then fires curated vulnerability payloads across 6 vulnerability modules. Responses are evaluated by a detection engine and surfaced through a structured findings lifecycle workflow.
An AI layer powered by Groq Llama 3.3 70B generates multi-step chained attack sequences — synthesising contextual exploitation paths that go beyond individual endpoint scanning, giving analysts actionable POCs with per-step approval controls.
Parses OpenAPI/Swagger specs at 10+ common paths with heuristic fallback probing for undocumented or non-standard endpoints.
Surface MapperSQL Injection, XSS, IDOR, SSRF, Command Injection, and Path Traversal — each with curated payload sets, error-based, time-based, and behavioural detection.
Payload EngineGroq Llama 3.3 70B generates 3 chained attack sequences with step-by-step POCs, per-step human approval, and chain regeneration if results are unsatisfactory.
Groq AIFull findings lifecycle: OPEN → IN_PROGRESS → FIXED_PENDING_VERIFICATION → VERIFIED_FIXED. RBAC-enforced status transitions across admin, analyst, and developer roles.
Triage WorkflowBurp Repeater-equivalent HTTP editor. Craft and send arbitrary requests with syntax highlighting, rate limiting, role gating, and full audit logging of every transaction.
Manual TestingWSTG-aligned reports with CWE and OWASP API Top 10 mappings, executive summary, retest evidence, appendices, and export to JSON or PDF.
ComplianceClient-side JWT Inspector — decode header/payload, highlight expiry and algorithm. Encoder/Decoder for Base64, URL encoding, HTML entities, and hex. No data sent to server.
ToolkitReal-time grade card with risk breakdown across all findings, timeline chart of vulnerabilities discovered per scan run, and at-a-glance run statistics.
AnalyticsIntentionally insecure FastAPI app with 11 vuln endpoints — SQLi, XSS, IDOR, SSRF, CMD, Path Traversal, BFLA, Mass Assignment, Open Redirect — for safe local testing.
Sandbox Target| Vuln Type | Sandbox | Juice Shop |
|---|---|---|
| SQL Injection | ✓ DETECTED | ✓ DETECTED |
| XSS | ✓ DETECTED | ✓ DETECTED |
| IDOR | ✓ DETECTED | ✓ DETECTED |
| SSRF | ✓ DETECTED | — N/A |
| Path Traversal | ✓ DETECTED | — N/A |
| Cmd Injection | ✓ DETECTED | — N/A |
No actionable vulnerabilities identified in the scanner codebase itself. All 7 initial findings were determined to be intentional features, standard patterns, or covered by hard exclusion rules.
Full source code, Docker Compose setup, documentation, and intentionally vulnerable sandbox for local testing. Clone and run the entire stack with a single docker-compose up --build.