Package Exports
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (nicefox-secu) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
NiceFox Secu
AI-powered pentesting for web developers. Find vulnerabilities, fix them in your code, verify the fixes — all in one session, with zero security experience needed.
Works with any AI coding agent: Claude Code, Codex, opencode, Cursor, Kimi, aider...
Based on the AIDA methodology.
Quick Start
1. Install Exegol (one-time)
Exegol is a Docker-based pentesting toolbox. Install it once:
pip install exegol
exegol installThen create the container:
exegol start nicefox
# Select the 'free' image (community), or 'web'/'full' if you have a Pro subscription2. Run NiceFox Secu
From your project directory:
npx nicefox-secuThis checks Docker and Exegol are ready, then tells you exactly what to do next.
3. Start the Pentest
Open your AI coding agent from your project directory and paste:
Read ~/.nicefox-secu/PENTEST.md and start the pentestThe AI will:
- Auto-detect your framework, target URL, and environment (dev/prod)
- Ask you to confirm — one question instead of a setup wizard
- Pentest your app (recon, endpoint mapping, vulnerability testing)
- Fix each vulnerability directly in your source code
- Verify each fix by re-testing
- Generate a report at
reports/{project}_pentest_report.md
Example
$ cd ~/projects/my-express-api
$ npx nicefox-secu
NiceFox Secu
AI-powered pentesting for web developers
✓ Docker is running
✓ Exegol container ready (exegol-nicefox)
✓ Prompt installed
Ready! Open your AI coding agent from your project directory and paste:
Read ~/.nicefox-secu/PENTEST.md and start the pentest
$ claude # or opencode, cursor, codex, aider...
> Read ~/.nicefox-secu/PENTEST.md and start the pentest
AI: Detected: Express.js project, target http://localhost:3000, dev mode.
Start the pentest? (Y/n)
You: Y
AI: [scanning, testing, fixing...]
AI: Found VULN-001: SQL Injection in POST /api/search (CRITICAL)
Fixing src/routes/search.js — parameterized query...
Fix verified.
AI: Found VULN-002: Missing rate limiting on POST /api/login (MEDIUM)
Fixing src/routes/auth.js — adding express-rate-limit...
Fix verified.
AI: Assessment complete. Generated reports/my-express-api_pentest_report.md
Found 2 vulnerabilities, fixed 2.Environment Modes
Development (auto-detected when target is localhost):
- Aggressive scanning, all exploitation techniques allowed
- AI edits your source code directly to fix vulnerabilities
- Full tool suite
Production (auto-detected when target is a real domain):
- Non-destructive tests only, rate limits respected
- AI documents recommended fixes but does NOT edit code
- Extra caution on risky tests
Prerequisites
| Linux (recommended) | macOS | Windows | |
|---|---|---|---|
| Node.js | nodejs.org | brew install node |
nodejs.org |
| Docker | Docker Engine | OrbStack or Docker Desktop | Docker Desktop (WSL 2) |
| Python 3 + pipx | sudo apt install python3 pipx |
brew install python3 pipx |
python.org |
Windows: Run from a WSL 2 terminal for best compatibility.
Safety
- Always test against a dev/staging environment first
- Never test production systems without explicit authorization
- Backup your code before running (or just use git — you do use git, right?)
- The AI will not modify production code — it only documents fixes in prod mode
Troubleshooting
Container won't start
docker info # Check Docker is running
docker ps -a | grep nicefox # Check container status
docker start exegol-nicefox # Start stopped containerTools not responding
docker exec exegol-nicefox nmap --version # Test a tool manuallyRecreate the container
exegol stop nicefox
exegol remove nicefox
exegol start nicefoxLicense
MIT — Use at your own risk. Only test systems you own or have explicit permission to test.
Credits
Based on AIDA (AI-Driven Security Assessment), simplified for web developers.