aliasrobotics/cai

GitHub: aliasrobotics/cai

CAI 是一个开源的 AI 驱动网络安全 Agent 框架,旨在帮助安全专业人员和研究人员构建、部署自动化攻防工具,实现从侦察到漏洞利用的全链路安全评估。

Stars: 7750 | Forks: 1105

# 网络安全 AI (`CAI`)

aliasrobotics%2Fcai | Trendshift European Open Source - Most Starred Top 3 European Open Source - Most Forked Top 3 [![版本](https://badge.fury.io/py/cai-framework.svg)](https://badge.fury.io/py/cai-framework) [![下载量](https://static.pepy.tech/badge/cai-framework)](https://pepy.tech/projects/cai-framework) [![Linux](https://img.shields.io/badge/Linux-Supported-brightgreen?logo=linux&logoColor=white)](https://github.com/aliasrobotics/cai) [![OS X](https://img.shields.io/badge/OS%20X-Supported-brightgreen?logo=apple&logoColor=white)](https://github.com/aliasrobotics/cai) [![Windows](https://img.shields.io/badge/Windows-Supported-brightgreen?logo=windows&logoColor=white)](https://github.com/aliasrobotics/cai) [![Android](https://img.shields.io/badge/Android-Supported-brightgreen?logo=android&logoColor=white)](https://github.com/aliasrobotics/cai) [![Discord](https://img.shields.io/badge/Discord-7289DA?logo=discord&logoColor=white)](https://discord.gg/fnUFcTaQAC) [![arXiv](https://img.shields.io/badge/arXiv-2504.06017-b31b1b.svg)](https://arxiv.org/pdf/2504.06017) [![arXiv](https://img.shields.io/badge/arXiv-2506.23592-b31b1b.svg)](https://arxiv.org/pdf/2506.23592) [![arXiv](https://img.shields.io/badge/arXiv-2508.13588-b31b1b.svg)](https://arxiv.org/pdf/2508.13588) [![arXiv](https://img.shields.io/badge/arXiv-2508.21669-b31b1b.svg)](https://arxiv.org/pdf/2508.21669) [![arXiv](https://img.shields.io/badge/arXiv-2509.14096-b31b1b.svg)](https://arxiv.org/pdf/2509.14096) [![arXiv](https://img.shields.io/badge/arXiv-2509.14139-b31b1b.svg)](https://arxiv.org/pdf/2509.14139) [![arXiv](https://img.shields.io/badge/arXiv-2510.17521-b31b1b.svg)](https://arxiv.org/pdf/2510.17521) [![arXiv](https://img.shields.io/badge/arXiv-2510.24317-b31b1b.svg)](https://arxiv.org/pdf/2510.24317)
[^1]: 可以说,Chain-of-Thought Agentic 模式是 Hierarchical Agentic 模式的一种特例。 [^2]: Kamhoua, C. A., Leslie, N. O., & Weisman, M. J. (2018). Game theoretic modeling of advanced persistent threat in internet of things. Journal of Cyber Security and Information Systems. [^3]: Yao, S., Zhao, J., Yu, D., Du, N., Shafran, I., Narasimhan, K., & Cao, Y. (2023, January). React: Synergizing reasoning and acting in language models. In International Conference on Learning Representations (ICLR). [^4]: Deng, G., Liu, Y., Mayoral-Vilches, V., Liu, P., Li, Y., Xu, Y., ... & Rass, S. (2024). {PentestGPT}: Evaluating and harnessing large language models for automated penetration testing. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 847-864).
标签:AI安全框架, AI攻防, AI框架, AI红队, AI网络安全, AI风险缓解, CAI, IP 地址批量处理, LLM Agent, Python, 事件响应, 人工智能安全, 反取证, 合规性, 大模型安全, 安全智能体, 安全评估, 密码管理, 开源安全工具, 无后门, 网络安全, 网络安全助手, 请求拦截, 逆向工具, 逆向工程平台, 隐私保护