Skip to content

zakirkun/saber-ai

Repository files navigation

SABER banner

SABER: Autonomous AI Penetration Testing Agent

SABER is an AI-assisted platform for authorized security testing. It combines a phase-aware autonomous engine with an operator-friendly CLI/TUI so teams can run repeatable reconnaissance, analysis, exploitation validation, and reporting workflows from one workspace.

Legal and ethical use only. You must have explicit permission before testing any target.

Features

  • Interactive-first workflow with in-session autonomous execution via saber start.
  • Phase-aware engine with guided workflow transitions (RECON -> ENUM -> ANALYZE -> EXPLOIT -> REPORT).
  • Multi-provider AI routing with fallback chains (Anthropic, OpenAI, Gemini, Groq, Ollama, xAI).
  • Docker-first execution stack with a Kali sandbox and companion services (Caido, SearXNG, ChromaDB).
  • Built-in tool catalog commands for discovery, installation, execution, and updates.
  • Session persistence, workspace artifact tracking, and report generation.
  • Operator guardrails for command safety and workspace/path protection.

Repository Layout

saber-ai/
|- saber-core/    Core engine (agent loop, AI routing, tools, skills, memory)
|- saber-cli/     CLI/TUI front-end and operator commands
|- docker/        Compose stack and Kali sandbox container build context
`- docs/          Project documentation

Preview

SABER CLI preview

Installation

Prerequisites

Dependency Recommended Notes
Python 3.12+ pyproject.toml supports ^3.10, but 3.12 is recommended for local tooling parity
Poetry 1.8+ SABER has two packages: saber-core and saber-cli
Docker Engine 24+ Required for sandboxed autonomous execution
Docker Compose v2 docker compose plugin or standalone binary

Setup

# Clone the repository
git clone https://github.com/zakirkun/saber-ai.git
cd saber-ai

# Optional but recommended: create and activate a virtual environment
python -m venv .venv
# Linux/macOS: source .venv/bin/activate
# Windows PowerShell: .venv\Scripts\Activate.ps1

# Install core package dependencies
cd saber-core
poetry install

# Install CLI package dependencies
cd ../saber-cli
poetry install

If the saber command is not on your shell PATH, run commands with:

cd saber-cli
poetry run saber --version

First-time Docker build

cd ../docker
docker compose build kali-sandbox

First-time configuration

saber config wizard

For full installation details, see docs/installation.md.

Usage

Interactive mode (saber start)

# Textual TUI (default)
saber start --target example.com --mode PENTEST

# Plain REPL
saber start --target example.com --plain

# Resume a session
saber start --resume <SESSION_ID>

# From inside the interactive prompt, launch autonomous workflow
autonomous --mode stealth
autonomous example.com --mode aggressive --parallel-agents 3 --output report.json

In autonomous mode, stealth starts conservatively and auto-switches to aggressive behavior at EXPLOIT.

When docker.compose_auto_up is enabled (default), saber start can auto-check and start the Compose stack unless --skip-compose is passed.

CLI Reference

saber start   [--target TARGET] [--mode MODE] [--plain] [--resume ID] [--skip-compose]
  interactive meta-command:
  autonomous [target] [--mode stealth|aggressive] [--max-concurrency N] [--parallel-agents N] [--max-tasks N] [--output FILE] [--skip-compose]
saber tools   list|search|show|install|run|update ...
saber session list|resume|delete ...
saber mode    list|set ...
saber phase   list|jump ...
saber agent   spawn|list|kill ...
saber checklist generate|show ...
saber workspace open|list|export ...
saber config  show|get|set|wizard ...

Documentation

Primary docs are in docs/:

  • docs/README.md: documentation index.
  • docs/installation.md: full setup and verification guide.
  • docs/usage.md: command usage and operator workflows.
  • docs/features.md: platform capability overview.
  • docs/architecture.md: system-level design and flow.
  • docs/core-internals.md: engine internals and module responsibilities.
  • docs/docker.md: container stack and troubleshooting.
  • docs/adding-skills.md: custom skill authoring.

Package-specific references:

  • saber-core/README.md
  • saber-cli/README.md

License

This project is released under the MIT License.

Legal Disclaimer

SABER is intended for educational use and authorized security assessments. Operators are solely responsible for complying with all applicable laws, contracts, and disclosure requirements. Do not test systems without explicit, written authorization from the system owner.

About

A production-grade, autonomous, AI-powered penetration testing and security automation platform.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors