From 01e6bc3fb1951bada82a533ea9e534f758a3cab1 Mon Sep 17 00:00:00 2001
From: tduhamel42
-
@@ -26,19 +25,19 @@
---
-> π§ **FuzzForge AI is under active development.** Expect breaking changes and new features!
+> π§ **SecPipe AI is under active development.** Expect breaking changes and new features!
---
## π Overview
-**FuzzForge AI** is an open-source MCP server that enables AI agents (GitHub Copilot, Claude, etc.) to orchestrate security research workflows through the **Model Context Protocol (MCP)**.
+**SecPipe AI** is an open-source MCP server that enables AI agents (GitHub Copilot, Claude, etc.) to orchestrate security research workflows through the **Model Context Protocol (MCP)**.
-FuzzForge connects your AI assistant to **MCP tool hubs** β collections of containerized security tools that the agent can discover, chain, and execute autonomously. Instead of manually running security tools, describe what you want and let your AI assistant handle it.
+SecPipe connects your AI assistant to **MCP tool hubs** β collections of containerized security tools that the agent can discover, chain, and execute autonomously. Instead of manually running security tools, describe what you want and let your AI assistant handle it.
### The Core: Hub Architecture
-FuzzForge acts as a **meta-MCP server** β a single MCP endpoint that gives your AI agent access to tools from multiple MCP hub servers. Each hub server is a containerized security tool (Binwalk, YARA, Radare2, Nmap, etc.) that the agent can discover at runtime.
+SecPipe acts as a **meta-MCP server** β a single MCP endpoint that gives your AI agent access to tools from multiple MCP hub servers. Each hub server is a containerized security tool (Binwalk, YARA, Radare2, Nmap, etc.) that the agent can discover at runtime.
- **π Discovery**: The agent lists available hub servers and discovers their tools
- **π€ AI-Native**: Hub tools provide agent context β usage tips, workflow guidance, and domain knowledge
@@ -75,7 +74,7 @@ Agent β Crash Analysis: Deduplicate and triage discovered crashes
## β Support the Project
-If you find FuzzForge useful, please **star the repo** to support development! π
+If you find SecPipe useful, please **star the repo** to support development! π
@@ -106,7 +105,7 @@ If you find FuzzForge useful, please **star the repo** to support development!
β MCP Protocol (stdio)
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
-β FuzzForge MCP Server β
+β SecPipe MCP Server β
β β
β Projects Hub Discovery Hub Execution β
β ββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββββ β
@@ -135,7 +134,7 @@ If you find FuzzForge useful, please **star the repo** to support development!
## π§ MCP Security Hub
-FuzzForge ships with built-in support for the **[MCP Security Hub](https://github.com/FuzzingLabs/mcp-security-hub)** β a collection of 36 production-ready, Dockerized MCP servers covering offensive security:
+SecPipe ships with built-in support for the **[MCP Security Hub](https://github.com/FuzzingLabs/mcp-security-hub)** β a collection of 36 production-ready, Dockerized MCP servers covering offensive security:
| Category | Servers | Examples |
|----------|---------|----------|
@@ -205,7 +204,7 @@ uv run fuzzforge mcp install claude-desktop
uv run fuzzforge mcp status
```
-**Restart your editor** and your AI agent will have access to FuzzForge tools!
+**Restart your editor** and your AI agent will have access to SecPipe tools!
---
@@ -220,7 +219,7 @@ Once installed, just talk to your AI agent:
"Run nuclei against https://example.com"
```
-The agent will use FuzzForge to discover the right hub tools, chain them into a pipeline, and return results β all without you touching a terminal.
+The agent will use SecPipe to discover the right hub tools, chain them into a pipeline, and return results β all without you touching a terminal.
See the [Usage Guide](USAGE.md) for detailed setup and advanced workflows.
@@ -230,7 +229,7 @@ See the [Usage Guide](USAGE.md) for detailed setup and advanced workflows.
```
fuzzforge_ai/
-βββ fuzzforge-mcp/ # MCP server β the core of FuzzForge
+βββ fuzzforge-mcp/ # MCP server β the core of SecPipe
βββ fuzzforge-cli/ # Command-line interface & terminal UI
βββ fuzzforge-common/ # Shared abstractions (containers, storage)
βββ fuzzforge-runner/ # Container execution engine (Docker/Podman)
diff --git a/ROADMAP.md b/ROADMAP.md
index 20f3632..e00bdb3 100644
--- a/ROADMAP.md
+++ b/ROADMAP.md
@@ -1,6 +1,6 @@
-# FuzzForge AI Roadmap
+# SecPipe AI Roadmap
-This document outlines the planned features and development direction for FuzzForge AI.
+This document outlines the planned features and development direction for SecPipe AI.
---
@@ -10,27 +10,27 @@ This document outlines the planned features and development direction for FuzzFo
**Status:** π Planned
-Integrate [mcp-security-hub](https://github.com/FuzzingLabs/mcp-security-hub) tools into FuzzForge, giving AI agents access to 28 MCP servers and 163+ security tools through a unified interface.
+Integrate [mcp-security-hub](https://github.com/FuzzingLabs/mcp-security-hub) tools into SecPipe, giving AI agents access to 28 MCP servers and 163+ security tools through a unified interface.
#### How It Works
-Unlike native FuzzForge modules (built with the SDK), mcp-security-hub tools are **standalone MCP servers**. The integration will bridge these tools so they can be:
+Unlike native SecPipe modules (built with the SDK), mcp-security-hub tools are **standalone MCP servers**. The integration will bridge these tools so they can be:
- Discovered via `list_modules` alongside native modules
-- Executed through FuzzForge's orchestration layer
+- Executed through SecPipe's orchestration layer
- Chained with native modules in workflows
| Aspect | Native Modules | MCP Hub Tools |
|--------|----------------|---------------|
-| **Runtime** | FuzzForge SDK container | Standalone MCP server container |
+| **Runtime** | SecPipe SDK container | Standalone MCP server container |
| **Protocol** | Direct execution | MCP-to-MCP bridge |
| **Configuration** | Module config | Tool-specific args |
-| **Output** | FuzzForge results format | Tool-native format (normalized) |
+| **Output** | SecPipe results format | Tool-native format (normalized) |
#### Goals
- Unified discovery of all available tools (native + hub)
-- Orchestrate hub tools through FuzzForge's workflow engine
+- Orchestrate hub tools through SecPipe's workflow engine
- Normalize outputs for consistent result handling
- No modification required to mcp-security-hub tools
@@ -65,7 +65,7 @@ AI Agent:
**Status:** π Planned
-A graphical interface to manage FuzzForge without the command line.
+A graphical interface to manage SecPipe without the command line.
#### Goals
diff --git a/USAGE.md b/USAGE.md
index 07ae248..e105643 100644
--- a/USAGE.md
+++ b/USAGE.md
@@ -1,8 +1,8 @@
-# FuzzForge AI Usage Guide
+# SecPipe AI Usage Guide
-This guide covers everything you need to know to get started with FuzzForge AI β from installation to linking your first MCP hub and running security research workflows with AI.
+This guide covers everything you need to know to get started with SecPipe AI β from installation to linking your first MCP hub and running security research workflows with AI.
-> **FuzzForge is designed to be used with AI agents** (GitHub Copilot, Claude, etc.) via MCP.
+> **SecPipe is designed to be used with AI agents** (GitHub Copilot, Claude, etc.) via MCP.
> A terminal UI (`fuzzforge ui`) is provided for managing agents and hubs.
> The CLI is available for advanced users but the primary experience is through natural language interaction with your AI assistant.
@@ -27,7 +27,7 @@ This guide covers everything you need to know to get started with FuzzForge AI
- [GitHub Copilot](#github-copilot)
- [Claude Code (CLI)](#claude-code-cli)
- [Claude Desktop](#claude-desktop)
-- [Using FuzzForge with AI](#using-fuzzforge-with-ai)
+- [Using SecPipe with AI](#using-secpipe-with-ai)
- [CLI Reference](#cli-reference)
- [Environment Variables](#environment-variables)
- [Troubleshooting](#troubleshooting)
@@ -76,13 +76,13 @@ git clone git@github.com:FuzzingLabs/mcp-security-hub.git ~/.fuzzforge/hubs/mcp-
# Restart your AI agent β done!
```
-> **Note:** FuzzForge uses Docker by default. Podman is also supported via `--engine podman`.
+> **Note:** SecPipe uses Docker by default. Podman is also supported via `--engine podman`.
---
## Prerequisites
-Before installing FuzzForge AI, ensure you have:
+Before installing SecPipe AI, ensure you have:
- **Python 3.12+** β [Download Python](https://www.python.org/downloads/)
- **uv** package manager β [Install uv](https://docs.astral.sh/uv/)
@@ -131,7 +131,7 @@ cd fuzzforge_ai
uv sync
```
-This installs all FuzzForge components in a virtual environment.
+This installs all SecPipe components in a virtual environment.
### 3. Verify Installation
@@ -143,7 +143,7 @@ uv run fuzzforge --help
## Terminal UI
-FuzzForge ships with a terminal user interface (TUI) built on [Textual](https://textual.textualize.io/) for managing AI agents and MCP hub servers from a single dashboard.
+SecPipe ships with a terminal user interface (TUI) built on [Textual](https://textual.textualize.io/) for managing AI agents and MCP hub servers from a single dashboard.
### Launching the UI
@@ -173,11 +173,11 @@ The main screen is split into two panels:
Select an agent row in the AI Agents table and press `Enter`:
-- **If the agent is not linked** β a setup dialog opens asking for your container engine (Docker or Podman), then installs the FuzzForge MCP configuration
+- **If the agent is not linked** β a setup dialog opens asking for your container engine (Docker or Podman), then installs the SecPipe MCP configuration
- **If the agent is already linked** β a confirmation dialog offers to unlink it (removes the `fuzzforge` entry without touching other MCP servers)
The setup auto-detects:
-- FuzzForge installation root
+- SecPipe installation root
- Docker/Podman socket path
- Hub configuration from `hub-config.json`
@@ -188,7 +188,7 @@ Press `h` to open the hub manager. This is where you manage your MCP hub reposit
| Button | Action |
|--------|--------|
| **FuzzingLabs Hub** | One-click clone of the official [mcp-security-hub](https://github.com/FuzzingLabs/mcp-security-hub) repository β clones to `~/.fuzzforge/hubs/mcp-security-hub`, scans for tools, and registers them in `hub-config.json` |
-| **Link Path** | Link any local directory as a hub β enter a name and path, FuzzForge scans it for `category/tool-name/Dockerfile` patterns |
+| **Link Path** | Link any local directory as a hub β enter a name and path, SecPipe scans it for `category/tool-name/Dockerfile` patterns |
| **Clone URL** | Clone any git repository and link it as a hub |
| **Remove** | Unlink the selected hub and remove its servers from the configuration |
@@ -219,7 +219,7 @@ my-hub/
βββ ...
```
-FuzzForge scans for the pattern `category/tool-name/Dockerfile` and auto-generates server configuration entries for each discovered tool.
+SecPipe scans for the pattern `category/tool-name/Dockerfile` and auto-generates server configuration entries for each discovered tool.
### FuzzingLabs Security Hub
@@ -290,7 +290,7 @@ uv run fuzzforge mcp install copilot
```
The command auto-detects:
-- **FuzzForge root** β Where FuzzForge is installed
+- **SecPipe root** β Where SecPipe is installed
- **Docker socket** β Auto-detects `/var/run/docker.sock`
**Optional overrides:**
@@ -298,7 +298,7 @@ The command auto-detects:
uv run fuzzforge mcp install copilot --engine podman
```
-**After installation:** Restart VS Code. FuzzForge tools appear in GitHub Copilot Chat.
+**After installation:** Restart VS Code. SecPipe tools appear in GitHub Copilot Chat.
### Claude Code (CLI)
@@ -306,7 +306,7 @@ uv run fuzzforge mcp install copilot --engine podman
uv run fuzzforge mcp install claude-code
```
-Installs to `~/.claude.json`. FuzzForge tools are available from any directory after restarting Claude.
+Installs to `~/.claude.json`. SecPipe tools are available from any directory after restarting Claude.
### Claude Desktop
@@ -332,15 +332,15 @@ uv run fuzzforge mcp uninstall claude-desktop
---
-## Using FuzzForge with AI
+## Using SecPipe with AI
-Once MCP is configured and hub images are built, interact with FuzzForge through natural language with your AI assistant.
+Once MCP is configured and hub images are built, interact with SecPipe through natural language with your AI assistant.
### Example Conversations
**Discover available tools:**
```
-You: "What security tools are available in FuzzForge?"
+You: "What security tools are available in SecPipe?"
AI: Queries hub tools β "I found 15 tools across categories: nmap for
port scanning, binwalk for firmware analysis, semgrep for code
scanning, cargo-fuzzer for Rust fuzzing..."
@@ -402,10 +402,10 @@ uv run fuzzforge project results