JSPM

  • Created
  • Published
  • Downloads 863
  • Score
    100M100P100Q108354F
  • License Apache-2.0

Find it. Break it. Fix it. The hacker's toolkit for AI agents.

Package Exports

  • hackmyagent
  • hackmyagent/arp
  • hackmyagent/context-window
  • hackmyagent/memory
  • hackmyagent/oasb
  • hackmyagent/plugins
  • hackmyagent/semantic
  • hackmyagent/shadow
  • hackmyagent/supply-chain

Readme

OpenA2A: CLI · HackMyAgent · Secretless · AIM · Browser Guard · DVAA · Registry (April 2026)

HackMyAgent

npm version License: Apache-2.0 Tests

183 security checks for AI agents. Find what can go wrong before an attacker does.

Security scanner and red-team toolkit for Claude Code, Cursor, VS Code, and any MCP server setup.

npx hackmyagent secure

That's it. No config files, no setup, no flags needed.

For a full security dashboard covering credentials, config integrity, shadow AI, and more:

npx opena2a-cli review

Website | Security Checks Reference | Use Cases | Demos | OpenA2A CLI


What It Finds

Attack testing -- 115 adversarial payloads across 11 categories (prompt injection, data exfiltration, jailbreak, MCP exploitation, supply chain, memory weaponization, A2A protocol attacks, context window attacks).

Static analysis -- 183 security checks across 35 categories covering credentials, MCP configs, OpenClaw/NemoClaw, Unicode steganography, CVE detection, governance, supply chain, memory poisoning, agent identity, and sandbox escape patterns.

Attack testing details (115 payloads)
  • Prompt injection -- tests whether agents follow injected instructions from untrusted input
  • Data exfiltration -- checks if agents can be tricked into leaking sensitive data to external endpoints
  • Jailbreak and context manipulation -- probes agent guardrails with adversarial prompts
  • MCP exploitation -- tests MCP servers for tool misuse, capability abuse, and unauthorized access
  • Capability abuse -- verifies agents can't exceed their intended permissions
  • Supply chain attacks -- dependency confusion, tool shadowing, package impersonation
  • Memory weaponization -- persistent instruction injection via agent memory systems
  • A2A protocol attacks -- identity spoofing, capability escalation in multi-agent communication
  • Context window attacks -- token flooding, attention manipulation, context poisoning
Static analysis details (183 checks)
  • Unicode steganography -- invisible codepoints, zero-width chars, bidi attacks, homoglyph confusables, GlassWorm decoders (real-world: os-info-checker-es6 npm attack, May 2025)
  • Hardcoded credentials -- API keys, tokens, and passwords in source or config files
  • MCP server misconfigurations -- open ports, root filesystem access, missing auth
  • AI agent CVE detection -- CVE-2026-25253 (OpenClaw RCE), CVE-2026-25157, CVE-2026-24763, ClawHavoc IOCs
  • OpenClaw security -- 34 checks for configurations, skills, gateway, credential redaction (6 PRs merged upstream)
  • NemoClaw/sandbox patterns -- curl-pipe without checksum, empty artifact digests, exec() injection, predictable /tmp paths, process.env leakage, TOCTOU races, unsafe deserialization, messaging API egress
  • Governance gaps -- missing SOUL.md, no capability policies, unsigned MCP servers
  • Credential scope drift -- Google Maps keys accessing Gemini, AWS S3 keys reaching Bedrock
  • Supply chain risks -- vulnerable dependencies, unsigned skills, tampered packages
  • Memory and RAG poisoning -- persistent instruction injection, knowledge base contamination
  • Agent identity -- missing cryptographic identity, capability claims without attestation

183 checks across 35 categories. 115 attack payloads. No flags needed.


Quick Start

# Run without installing
npx hackmyagent secure

# Install globally
npm install -g hackmyagent

# Or add to your project
npm install --save-dev hackmyagent

Requirements: Node.js 18+


┌──────────────────────────────────────────┐
│  HackMyAgent v0.11.5 — Security Scanner          │
│  Found: 3 critical · 5 high · 12 medium          │
│                                                  │
│  CRED-001  critical  Hardcoded API key in .env   │
│  MCP-003   high      MCP server on 0.0.0.0       │
│  NET-001   high      Open port exposed           │
│  ...                                             │
│                                                  │
│  Run with --fix to auto-remediate 8 issues       │
└──────────────────────────────────────────┘

Use Cases

Step-by-step guides for common workflows:

  • Scan my agent -- Run all 183 checks and auto-fix findings (5 min)
  • Red-team MCP servers -- Test MCP servers with adversarial payloads (10 min)
  • Secure OpenClaw -- OpenClaw-specific checks, CVE detection, ClawHavoc IOC scanning (10 min)
  • Secure NemoClaw -- Scan NVIDIA NemoClaw sandbox installations for credential exposure, network misconfig, and sandbox escape vectors (5 min)
  • CI/CD pipeline -- GitHub Actions with JSON/SARIF output (5 min)

Built-in Help

hackmyagent --help          # All commands and flags
hackmyagent --version       # Current version
hackmyagent [command] -h    # Help for a specific command
hackmyagent secure --ci     # Non-interactive mode for CI/CD

Commands

hackmyagent secure -- Security Scan

hackmyagent secure                            # scan current directory
hackmyagent secure ./my-project               # scan specific directory
hackmyagent secure --fix                      # auto-fix issues
hackmyagent secure --fix --dry-run            # preview fixes before applying
hackmyagent secure --ignore CRED-001,GIT-002  # skip specific checks
hackmyagent secure --json                     # JSON output for CI/CD
hackmyagent secure --verbose                  # show all checks including passed
hackmyagent secure --publish                  # push results to OpenA2A Registry
All 35 security categories
Category Checks What it detects
CRED 4 Hardcoded API keys, tokens, passwords
MCP 10 MCP server misconfigurations
CLAUDE 7 Claude Code security issues
NET 6 Network exposure, open ports
PROMPT 4 Prompt injection vectors
INJ 4 XSS, SQL injection, command injection
ENCRYPT 4 Missing encryption at rest
SESSION 4 Session management flaws
AUDIT 4 Missing audit trails
SANDBOX 4 Process isolation gaps
TOOL 4 Tool permission boundaries
AUTH 4 Authentication weaknesses
DEP 4 Vulnerable dependencies
ENV 4 Insecure environment variables
GIT 3 Git security (gitignore, hooks)
IO 4 Input/output validation
LOG 4 Logging and monitoring gaps
PERM 3 Overly permissive file permissions
PROC 4 Process isolation issues
RATE 4 Missing rate limiting
SEC 4 Security headers
API 4 API security issues
VSCODE 2 VS Code configuration risks
CURSOR 1 Cursor IDE configuration risks
CVE 4 Known CVE detection
GATEWAY 8 Gateway misconfigurations
CONFIG 9 Insecure default settings
SUPPLY 8 Supply chain attack vectors
SKILL 12 Malicious skill/tool detection
HEARTBEAT 7 Heartbeat/cron abuse
UNICODE-STEGO 5 Invisible codepoints, zero-width chars, bidi attacks, homoglyphs, GlassWorm decoders
MEM 5 Memory poisoning, context injection
RAG 4 RAG/knowledge base poisoning
AIM 3 Agent identity verification
NEMO 10 NemoClaw/sandbox patterns: curl-pipe, digest bypass, exec injection, /tmp races, env leakage
Auto-fix capabilities
Check Issue Auto-fix
CRED-001 Exposed API keys Replace with env var reference
GIT-001 Missing .gitignore Create with secure defaults
GIT-002 Incomplete .gitignore Add missing patterns
PERM-001 Overly permissive files Set restrictive permissions
MCP-001 Root filesystem access Scope to project directory
NET-001 Bound to 0.0.0.0 Bind to 127.0.0.1
GATEWAY-001 Gateway bound to 0.0.0.0 Bind to 127.0.0.1
GATEWAY-003 Plaintext token Replace with ${OPENCLAW_AUTH_TOKEN}
GATEWAY-004 Approvals disabled Enable approvals
GATEWAY-005 Sandbox disabled Enable sandbox

Use --dry-run to preview changes. Backups are created in .hackmyagent-backup/.


hackmyagent attack -- Red Team

Test your AI agent with 115 adversarial payloads across 11 attack categories.

hackmyagent attack --local                                    # local simulation
hackmyagent attack --local --system-prompt "You are helpful"  # with custom system prompt
hackmyagent attack https://api.example.com/v1/chat            # test live endpoint
hackmyagent attack --local --category prompt-injection         # single category
hackmyagent attack --local --intensity aggressive              # full payload suite
hackmyagent attack --local -f sarif -o results.sarif           # SARIF output
hackmyagent attack https://api.example.com --fail-on-vulnerable medium  # CI gate
Category Payloads Description
prompt-injection 12 Manipulate agent behavior via injected instructions
jailbreak 12 Bypass safety guardrails and system constraints
data-exfiltration 11 Extract sensitive data, system prompts, credentials
capability-abuse 10 Misuse agent tools for unintended actions
context-manipulation 10 Poison agent context or memory
supply-chain 10 Dependency confusion, package impersonation
tool-shadow 10 Tool shadowing, capability escalation
mcp-exploitation 10 MCP protocol abuse, tool injection
memory-weaponization 10 Persistent memory poisoning attacks
a2a-attacks 10 Agent-to-agent identity spoofing
context-window 10 Token flooding, attention manipulation

Only test systems you own or have written authorization to test.


hackmyagent secure -b oasb-1 -- OASB Benchmarks

Run the OASB-1 benchmark -- 46 controls across 10 categories with three maturity levels. OASB-2 adds behavioral governance (scan-soul) for a composite score.

hackmyagent secure -b oasb-1              # L1 baseline (26 controls)
hackmyagent secure -b oasb-1 -l L2        # L2 standard (44 controls)
hackmyagent secure -b oasb-1 --fail-below 70          # CI gate
hackmyagent secure -b oasb-2              # composite: infrastructure + governance

hackmyagent scan-soul -- Behavioral Governance

Scan a SOUL.md against OASB v2 behavioral governance controls -- 8 domains, up to 68 controls.

hackmyagent scan-soul                     # scan current directory
hackmyagent scan-soul --deep              # LLM semantic analysis (requires ANTHROPIC_API_KEY)
hackmyagent scan-soul --fail-below 60     # CI gate

Auto-detects governance file: SOUL.md > system-prompt.md > CLAUDE.md > .cursorrules > agent-config.yaml.

hackmyagent harden-soul -- Generate Governance

Generate a SOUL.md or add missing governance sections. Existing content is preserved.

hackmyagent harden-soul                   # add missing sections
hackmyagent harden-soul --dry-run         # preview without writing

hackmyagent secure-nemoclaw -- NemoClaw Sandbox Scanner

Scan NVIDIA NemoClaw installations for credential exposure, network misconfiguration, blueprint integrity issues, sandbox escape vectors, and inherited OpenClaw vulnerabilities. 28 checks across 6 categories.

hackmyagent secure-nemoclaw                  # scan auto-detected directory
hackmyagent secure-nemoclaw ~/.nemoclaw      # scan specific directory
hackmyagent secure-nemoclaw --json           # JSON output for CI
hackmyagent secure-nemoclaw --verbose        # show all checks including passed

hackmyagent trust -- Package Trust Verification

Check trust levels for AI packages before installing them. Queries the OpenA2A Registry trust graph (launching April 2026).

hackmyagent trust server-filesystem          # MCP shorthand
hackmyagent trust --audit package.json       # audit all dependencies
hackmyagent trust --batch pkg1 pkg2 pkg3     # batch lookup
hackmyagent trust express --json             # JSON output

Uses ai-trust under the hood.

More Commands

Command Description
hackmyagent fix-all Run all security plugins: credential vault, file signing, skill guard
hackmyagent check @publisher/skill Verify a skill's publisher identity and permissions
hackmyagent scan example.com Scan external infrastructure for exposed AI endpoints
hackmyagent rollback Undo auto-fix changes (backups created automatically)

Using with opena2a-cli

opena2a-cli is the unified CLI for all OpenA2A security tools. HackMyAgent powers opena2a review, opena2a scan, opena2a protect, opena2a benchmark, and opena2a scan-soul.

npm install -g opena2a-cli
opena2a review    # best place to start

Runtime Protection (ARP)

ARP monitors AI agents during execution with a 3-layer intelligence stack: rule-based pattern matching (40+ patterns), statistical anomaly detection, and LLM-assisted assessment.

opena2a runtime init     # generate config
opena2a runtime start    # start monitoring
opena2a runtime status   # check status

Also supports HTTP reverse proxy mode for inspecting OpenAI API, MCP, and A2A protocol traffic. See npx hackmyagent arp-guard proxy --help.


CI/CD Integration

All commands support --json and --ci flags.

name: Agent Security
on: [push, pull_request]
jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: actions/setup-node@v4
        with: { node-version: '20' }
      - run: npx hackmyagent secure --json > security-report.json
      - run: npx hackmyagent secure -b oasb-1 --fail-below 70
SARIF and pre-commit hook

SARIF (GitHub Security Tab)

- run: npx hackmyagent attack --local -f sarif -o results.sarif --fail-on-vulnerable medium
- uses: github/codeql-action/upload-sarif@v3
  with: { sarif_file: results.sarif }

Pre-commit Hook

#!/bin/sh
# .git/hooks/pre-commit
npx hackmyagent secure --ignore LOG-001,RATE-001

Exit Codes

Code Meaning
0 Clean -- no critical/high issues
1 Critical or high severity issues found
2 Incomplete scan -- one or more plugins failed

Programmatic API

import { HardeningScanner, AgentRuntimeProtection, AttackScanner } from 'hackmyagent';

See the Plugin API documentation for writing custom security plugins.


Contributing

Contributions welcome. See CONTRIBUTING.md.

git clone https://github.com/opena2a-org/hackmyagent.git
cd hackmyagent && npm install && npm run build && npm test

License

Apache-2.0

OpenA2A Ecosystem

OpenA2A CLI | Secretless AI | AIM | AI Browser Guard | DVAA