AI 战争 · 网络平台
ai-war agent platform (war.xcom.dev)
AI-driven autonomous pentesting infrastructure for cybersecurity professionals. Orchestrate 20+ integrated tools through a single LLM-powered attack chain. For authorized network testing only. OSINT → Enumeration → Exploitation → Reporting.
下载攻击链
Deploy the autonomous pentesting orchestrator on your infrastructure. The attack chain script handles tool orchestration, authorization checking, and multi-stage scan execution. Full scope verification required before scan initiation.
curl -O https://war.xcom.dev/attack-chain.sh bash attack-chain.sh --target example.com --mode standard
✓ Requires: nmap, nikto, gobuster (optional: enhanced results)
✓ Output: JSON/Markdown/PDF report
✓ Authorized scope verification required
✓ Scans: OSINT → Enumeration → Web → Exploitation
✓ Full parametrization for CI/CD integration
✓ Docker deployment: docker run war.xcom.dev:latest
✓ Kubernetes manifests available
✓ See: ./attack-chain.sh --help
交互式扫描界面
Download the cross-platform war.xcom.dev GUI client for macOS, Linux, and Windows. Point-and-click target selection, real-time scan progress, and one-click report export.
AI 智能体编排
war.xcom.dev is fully integrated with the OpenClaw AI agent framework. Manage, customize, and orchestrate pentesting agents from a unified workspace. Chain multiple skills together. Deploy autonomous red teams.
Primary autonomous pentesting agent. Orchestrates the full attack chain. Handles scope verification, tool sequencing, and report synthesis.
Full D2 specification for pentesting workloads. SKILL.md + TOOLS.md + REPORT.md. Integrated tool chain definitions. Customizable scan templates.
Continuous vulnerability hunting and asset monitoring. Real-time alerts. Feeds into pentesting pipeline. Detects infrastructure drift and new exposures.
Access the OpenClaw agent management interface at ai.xcom.dev/workspace.
Create custom agents, chain skills, set trigger conditions, and deploy autonomous red teams to your network.
全栈攻击面覆盖
war.xcom.dev is the autonomous pentesting surface of the XCOM network. A single command triggers a multi-stage scan pipeline — OSINT first, then network enumeration, web application probing, credential testing, and LLM-powered synthesis of the full attack surface. Every finding is CVSS-scored, de-duplicated, and exported in your format of choice. For authorized security professionals only.
渗透测试工具库
Every tool in the stack is open source, battle-tested, and orchestrated via the XCOM pentest skill. Click any tool to view its upstream documentation.
四层深度扫描
Each mode progressively deepens coverage and increases dwell time. Use Quick for rapid triage, Standard for typical engagements, Thorough for comprehensive red teams, and Continuous for persistent monitoring loops.
| Mode | Duration | Tools Active | Use Case |
|---|---|---|---|
| Quick | 5–15 min | Nmap top-1000, Nikto, Gobuster common, Shodan passive | Rapid triage. First look at unknown asset. CTF reconnaissance. |
| Standard | 30–90 min | Full TCP Nmap, Gobuster + FFUF, Nikto, sqlmap detect, Amass, ZAP passive | Standard pentest engagement. VAPT scoping phase. Bug bounty initial recon. |
| Thorough | 2–6 hrs | All tools. UDP scan, ZAP active, sqlmap exploit, Hydra credential test, Metasploit CVE validation, TruffleHog git scan | Full red team engagement. Compliance audit. Comprehensive VAPT report. |
|
Continuous
24/7 |
Persistent | Lightweight diff-based. Amass + Shodan polling. New port/service delta alerts. | Attack surface monitoring. Detect new exposures. Notify on configuration drift. |
LLM 驱动的流水线
Every scan follows the same structured attack chain. Each stage feeds its findings into the next. The LLM synthesis layer correlates all outputs into a unified attack narrative with prioritised remediation.
Authorization check. Verify written scope. Apply production blocklist. Log operator identity and scan parameters to immutable audit trail.
Amass subdomain enum → theHarvester email/IP harvest → crt.sh cert scrape → Shodan/Censys/VT/OTX passive intel → DNS zone transfer attempts.
Nmap SYN stealth full TCP + UDP top-200 → service version detection → NSE vuln scripts → smbmap + CrackMapExec on Windows targets → SNMP enumeration.
Nikto banner + vuln scan → Gobuster dir + DNS → FFUF parameter fuzzing → ZAP spider + active scan → GraphQL introspection → JWT decode → CORS check.
sqlmap on discovered injection points (w/ tamper scripts for WAF bypass) → NoSQL injection probes → Hydra/Medusa credential testing → IDOR enumeration.
All findings fed to local Qwen model. Correlates CVEs, chains attack vectors, estimates impact, assigns CVSS scores, and generates human-readable attack narrative.
六种导出格式
Every scan auto-generates a full report. CVSS v3.1 scoring on every finding. De-duplicated across tool outputs. Remediation steps linked to CVE references.
Human-readable report with executive summary, per-host findings, CVSS table, and remediation checklist. Renders natively in GitHub, Obsidian, and Notion.
Machine-readable structured output. Feeds directly into SIEM pipelines, ticketing systems (Jira, Linear), and CI/CD security gates.
Branded client-ready report. Full CVSS risk matrix, executive summary, and technical appendix. Converts to PDF via headless Chrome.
Static Analysis Results Interchange Format. GitHub Code Scanning compatible. Surfaces findings directly in pull request annotations and security dashboard.
Live scan progress and summary alerts delivered to your channel. Critical findings (CVSS ≥ 9.0) trigger immediate push notifications.
Auto-creates labelled issues from findings. CRITICAL/HIGH/MEDIUM/LOW severity labels, CVSS score in title, full technical detail and remediation in body.
快速开始
The XCOM pentest skill integrates with the OpenClaw agent framework. Trigger scans via Telegram, WhatsApp, or direct CLI. All commands require a valid scope authorization token.
Message your XCOM agent from any device. The skill handles scope verification, orchestrates the scan, and pushes progress updates every 5 minutes.
Run the pentest skill directly from the OpenClaw agent framework. The full D2 skill specification is available at the link below.
Authorize a target. Trigger the chain. Receive a full attack surface report in under 90 minutes.