SABER is an AI-assisted platform for authorized security testing. It combines a phase-aware autonomous engine with an operator-friendly CLI/TUI so teams can run repeatable reconnaissance, analysis, exploitation validation, and reporting workflows from one workspace.
Legal and ethical use only. You must have explicit permission before testing any target.
- Interactive-first workflow with in-session autonomous execution via
saber start. - Phase-aware engine with guided workflow transitions (
RECON -> ENUM -> ANALYZE -> EXPLOIT -> REPORT). - Multi-provider AI routing with fallback chains (Anthropic, OpenAI, Gemini, Groq, Ollama, xAI).
- Docker-first execution stack with a Kali sandbox and companion services (Caido, SearXNG, ChromaDB).
- Built-in tool catalog commands for discovery, installation, execution, and updates.
- Session persistence, workspace artifact tracking, and report generation.
- Operator guardrails for command safety and workspace/path protection.
saber-ai/
|- saber-core/ Core engine (agent loop, AI routing, tools, skills, memory)
|- saber-cli/ CLI/TUI front-end and operator commands
|- docker/ Compose stack and Kali sandbox container build context
`- docs/ Project documentation
| Dependency | Recommended | Notes |
|---|---|---|
| Python | 3.12+ | pyproject.toml supports ^3.10, but 3.12 is recommended for local tooling parity |
| Poetry | 1.8+ | SABER has two packages: saber-core and saber-cli |
| Docker Engine | 24+ | Required for sandboxed autonomous execution |
| Docker Compose | v2 | docker compose plugin or standalone binary |
# Clone the repository
git clone https://github.com/zakirkun/saber-ai.git
cd saber-ai
# Optional but recommended: create and activate a virtual environment
python -m venv .venv
# Linux/macOS: source .venv/bin/activate
# Windows PowerShell: .venv\Scripts\Activate.ps1
# Install core package dependencies
cd saber-core
poetry install
# Install CLI package dependencies
cd ../saber-cli
poetry installIf the saber command is not on your shell PATH, run commands with:
cd saber-cli
poetry run saber --versioncd ../docker
docker compose build kali-sandboxsaber config wizardFor full installation details, see docs/installation.md.
# Textual TUI (default)
saber start --target example.com --mode PENTEST
# Plain REPL
saber start --target example.com --plain
# Resume a session
saber start --resume <SESSION_ID>
# From inside the interactive prompt, launch autonomous workflow
autonomous --mode stealth
autonomous example.com --mode aggressive --parallel-agents 3 --output report.jsonIn autonomous mode, stealth starts conservatively and auto-switches to
aggressive behavior at EXPLOIT.
When docker.compose_auto_up is enabled (default), saber start can
auto-check and start the Compose stack unless --skip-compose is passed.
saber start [--target TARGET] [--mode MODE] [--plain] [--resume ID] [--skip-compose]
interactive meta-command:
autonomous [target] [--mode stealth|aggressive] [--max-concurrency N] [--parallel-agents N] [--max-tasks N] [--output FILE] [--skip-compose]
saber tools list|search|show|install|run|update ...
saber session list|resume|delete ...
saber mode list|set ...
saber phase list|jump ...
saber agent spawn|list|kill ...
saber checklist generate|show ...
saber workspace open|list|export ...
saber config show|get|set|wizard ...
Primary docs are in docs/:
docs/README.md: documentation index.docs/installation.md: full setup and verification guide.docs/usage.md: command usage and operator workflows.docs/features.md: platform capability overview.docs/architecture.md: system-level design and flow.docs/core-internals.md: engine internals and module responsibilities.docs/docker.md: container stack and troubleshooting.docs/adding-skills.md: custom skill authoring.
Package-specific references:
saber-core/README.mdsaber-cli/README.md
This project is released under the MIT License.
SABER is intended for educational use and authorized security assessments. Operators are solely responsible for complying with all applicable laws, contracts, and disclosure requirements. Do not test systems without explicit, written authorization from the system owner.