AI-Powered Vulnerability Detection & Security Automation Platform
Built for Sparkathon - Advanced Security Scanning with No-Code Workflows
Vulnpilot is a comprehensive security automation platform that combines advanced vulnerability detection with AI-powered code analysis and no-code workflow automation. This Sparkathon project demonstrates cutting-edge security tools integration with modern web technologies.
- π Multi-Layer Security Scanning: OWASP Top 10, SANS 25, and custom vulnerability detection
- π€ AI-Powered Code Analysis: Conversational AI for intelligent vulnerability insights
- β‘ No-Code Security Workflows: Visual workflow builder for automated security processes
- π Real-Time Reporting: Comprehensive security reports with actionable insights
- π GitHub Integration: Seamless repository scanning and issue management
- π¨ Modern UI/UX: Responsive design with dark/light theme support
- π³ Docker Support: Containerized deployment for easy setup
- Frontend: React 19 + TypeScript + Tailwind CSS + Vite
- Backend API: Node.js + Express + MongoDB
- Security Engine: Django + Python + PostgreSQL
- AI Integration: Groq SDK for intelligent analysis
- Containerization: Docker + Docker Compose
- Security Tools: Nmap, Nikto, SQLMap, Gobuster, WPScan
Sparkathon/
βββ service/ # Security scanning engine
βββ backend/ # API & AI service
βββ frontend/ # User interface
βββ Makefile # Build automation
βββ docker-compose.yaml # Multi-service orchestration
βββ .gitignore # Comprehensive exclusions
# Clone and setup
git clone <your-repo-url> vulnpilot
cd vulnpilot
# Start development
make dev
# OR start with Docker
make start# Check requirements
make check-dependencies
# Install dependencies
make install-dependencies
# Setup environment
make setup-env
# Start services
make devDEBUG=True
SECRET_KEY=your-django-secret-key
DATABASE_URL=postgresql://user:pass@localhost:5432/vulnpilot
ALLOWED_HOSTS=localhost,127.0.0.1,0.0.0.0NODE_ENV=development
PORT=3000
MONGODB_URI=mongodb://localhost:27017/vulnpilot
GITHUB_CLIENT_ID=your-github-client-id
GITHUB_CLIENT_SECRET=your-github-client-secret
GROQ_API_KEY=your-groq-api-key
EMAIL_USER=your-email@gmail.com
EMAIL_PASSWORD=your-app-passwordVITE_API_BASE_URL=http://localhost:3000
VITE_DJANGO_API_URL=http://localhost:8000
VITE_APP_NAME=VulnpilotVulnPilot can send security reports via email. To enable this feature:
./setup-email.sh-
Enable 2-Factor Authentication on your Gmail account:
- Go to Google Account Security
- Turn on 2-Step Verification
-
Generate App Password:
- Go to Google App Passwords
- Select "Mail" β "Other (custom name)"
- Enter "VulnPilot Scanner"
- Copy the 16-character password
-
Update backend/.env:
ENABLE_EMAIL_NOTIFICATIONS=true EMAIL_USER=your-email@gmail.com EMAIL_PASSWORD=your_16_character_app_password DEFAULT_EMAIL_RECIPIENT=your-email@gmail.com
-
Test Configuration:
node test-email.js
- "Invalid login" error: Use Gmail App Password, not regular password
- "Email notifications disabled": Set
ENABLE_EMAIL_NOTIFICATIONS=true - Emails not received: Check spam folder, verify recipient address
- Connection timeout: Check firewall/network settings
make help # Show all available commands
make setup # Complete setup (first time)
make dev # Start development servers
make start # Start with Docker
make stop # Stop all services
make build # Build for production
make test # Run all tests
make clean # Clean build artifactsmake dev-django # Start Django backend only
make dev-node # Start Node.js backend only
make dev-react # Start React frontend only
make docker-build # Build Docker images
make docker-up # Start with Docker Compose
make logs # Show application logs
make health # Check service health# Build and start all services
make docker-build
make docker-up
# Access services
# Frontend: http://localhost
# Django API: http://localhost:8000
# Node.js API: http://localhost:3000- Nmap: Network discovery and port scanning
- Nikto: Web vulnerability scanner
- SQLMap: SQL injection detection and exploitation
- Gobuster: Directory and file brute-forcing
- WPScan: WordPress vulnerability scanner
- Repository Scan: GitHub repo β AI analysis β Vulnerability report
- Web Application Scan: URL β Multiple scanners β Consolidated report
- Network Discovery: IP range β Port scan β Service enumeration
- Code Review: Source code β AI analysis β Security recommendations
make testmake test-django # Django tests
make test-node # Node.js tests
make test-react # React testsmake logs # All logs
make docker-logs # Docker logsmake health # Check all services# Check what's using ports
lsof -i :3000
lsof -i :8000
lsof -i :5173
# Kill processes if needed
pkill -f "npm"
pkill -f "python manage.py runserver"# Clean Docker environment
docker system prune -a
docker-compose down -v
# Rebuild everything
make clean
make docker-build
make docker-up# Clean and reinstall
make clean
rm -rf */node_modules
rm -rf Django-backend/venv
make install-dependencies- Fork the repository
- Create a feature branch:
git checkout -b feature/amazing-feature - Make your changes
- Run tests:
make test - Run linting:
make lint - Commit changes:
git commit -m 'Add amazing feature' - Push to branch:
git push origin feature/amazing-feature - Open a Pull Request
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.
This project was created for the Sparkathon competition, demonstrating:
- Innovation: AI-powered security automation
- Technical Excellence: Modern full-stack architecture
- Practical Value: Real-world security tools integration
- User Experience: Intuitive no-code workflow builder
- Scalability: Containerized microservices architecture
For support and questions:
- Create an issue in the repository
- Check the troubleshooting section
- Review the logs:
make logs - Run health checks:
make health
Built with β€οΈ for Sparkathon
π Happy Coding & Secure Development! π‘οΈ