Topics: access-control, authz-testing, security-testing, web-security, ai-security, ai-driven-security, ai-vulnerability-detection, llm-security, privhunter-ai-logic, autonomous-access-forensics, zero-trust-vulnerability-auditor, intelligent-exploit-surface-scanner, automated-privilege-audit-framework, access-rights-telemetry-ai, heuristic-vulnerability-discovery, security-posture-sentinel
A tool that detects unauthorized access vulnerabilities through passive proxying, leveraging mainstream AI engines such as Kimi, DeepSeek, GPT, and others. Its core detection capabilities are built upon the open APIs of these AI engines, supporting data transmission and interaction via the HTTPS protocol.
- Download the source code or Releases;
- Edit the
config.jsonfile in the root directory to configure theAIand correspondingapiKeys(only one configuration is required); (AI values can be set to qianwen, kimi, hunyuan, gpt, glm, or deepseek); - Configure
headers2(headers for Request B); optionally configuresuffixesandallowedRespHeaders(interface suffix whitelist, e.g., .js); - Execute
go buildto compile the project, then run the binary file (if you downloaded Releases, you can run the binary file directly); - After the first program launch, install the certificate to resolve HTTPS traffic. The certificate is automatically generated upon initial startup and located at ~/.mitmproxy/mitmproxy-ca-cert.pem (Windows path: %USERPROFILE%\.mitmproxy\mitmproxy-ca-cert.pem). For installation steps, refer to the Python mitmproxy documentation: About Certificates.
- Configure BurpSuite to use the proxy server
127.0.0.1:9080(the port can be adjusted inmitmproxy.gounderAddr:“:9080”,) to begin scanning; - Scan results can be viewed via both the terminal and web interface. Access the frontend results at
127.0.0.1:8222.
| 字段 | 用途 | 内容举例 |
|---|---|---|
AI |
Specify the AI model to use | qianwen, kimi, hunyuan, gpt, glm, or deepseek |
apiKeys |
Store API keys for different AI services (enter one matching the AI model) | - “kimi”: “sk-xxxxxxx”- “deepseek”: “sk-yyyyyyy”- “qianwen”: “sk-zzzzzzz”- ‘hunyuan’: “sk-aaaaaaa” |
headers2 |
Custom HTTP request headers for Request B | - “Cookie”: “Cookie2”- “User-Agent”: ‘PrivHunterAI’- “Custom-Header”: “CustomValue” |
suffixes |
List of file suffixes to filter | .js, .ico, .png, .jpg, .jpeg |
allowedRespHeaders |
Content types (Content-Type) in HTTP response headers to filter |
image/png, text/html, application/pdf, text/css, audio/mpeg, audio/wav, video/mp4, application/grpc |
respBodyBWhiteList |
Authorization keywords (e.g., “No query permission”, “Insufficient permission”) for preliminary screening of non-privileged interfaces | - Invalid parameters- Incorrect page number- File does not exist- System busy, please try again later- Request parameter format incorrect- Insufficient permissions- Token cannot be empty- Internal error |
Continuously optimized, the current output results are as follows:
- Terminal Output:
- Frontend output (access 127.0.0.1:8222):
- Add scanning for sensitive information, such as detecting leaked keys in JavaScript files through regular expression matching combined with AI-assisted recognition;
- Optimize the scanning process for privilege escalation vulnerabilities and unauthorized access vulnerabilities to achieve more accurate scans while consuming fewer tokens.
- 2025.02.18
- ⭐️Added scan failure retry mechanism to prevent missed scans;
- ⭐️Added response Content-Type whitelist to exclude static files from scanning;
- ⭐️Added limit on maximum bytes per AI request during scans to prevent failures caused by oversized packets.
- 2025.02.25 - 02.27
- ⭐️ Added URL analysis (preliminary determination of whether it may be a public interface requiring no data authentication);
- ⭐️ Added frontend result display functionality.
- ⭐️ Added capability to add additional headers for Request B (supporting scenarios where authentication is not handled via cookies).
- 2025.03.01
- Optimize prompts to reduce false positive rates;
- Refine retry mechanism: Display prompts like
AI analysis anomaly detected, retrying... Reason: API returned 401: {“code”:“InvalidApiKey”,“message”:“Invalid API-key provided.”,‘request_id’:“xxxxx”}. Retry every 10 seconds; abandon after 5 consecutive failures (prevent infinite loops).
- 2025.03.03
- 💰 Cost optimization: Added authentication keyword filtering (e.g., “No query permission available,” “Insufficient permissions”) before triggering AI privilege violation checks. If keywords match, directly output non-violation results to conserve AI tokens and improve resource efficiency.
- 2025.03.21
- ⭐️ Added terminal output of request packet logs.
- 2025.04.10
- ⭐️ Added output of result confidence scores and optimized prompts.
- 2025.04.22 - 04.23
- Optimized frontend styling and introduced paginated query functionality to avoid loading all data at once, reducing browser rendering load and improving page responsiveness and user experience.
- 2025.06.07
- ⭐️ Added “Export Results” feature;
- Resolved response body garbled text issue.
Disclaimer: For technical exchange purposes only. Do not use for illegal activities.


