tduhamel42 87e3262832 docs: Remove obsolete volume_mode references from documentation
The volume_mode parameter is no longer used since workflows now upload files to MinIO storage instead of mounting volumes directly. This commit removes all references to volume_mode from:

- Backend API documentation (README.md)
- Tutorial getting started guide
- MCP integration guide
- CLI AI reference documentation
- SDK documentation and examples
- Test project documentation

All curl examples and code samples have been updated to reflect the current MinIO-based file upload approach.
2025-10-16 11:36:53 +02:00
2025-09-29 21:26:41 +02:00
2025-09-29 21:26:41 +02:00
2025-09-29 21:26:41 +02:00

FuzzForge Banner

🚧 FuzzForge is under active development

AI-powered workflow automation and AI Agents for AppSec, Fuzzing & Offensive Security

Discord License: BSL + Apache Python 3.11+ Website Version GitHub Stars

OverviewFeaturesInstallationQuickstartAI DemoContributingRoadmap


🚀 Overview

FuzzForge helps security researchers and engineers automate application security and offensive security workflows with the power of AI and fuzzing frameworks.

  • Orchestrate static & dynamic analysis
  • Automate vulnerability research
  • Scale AppSec testing with AI agents
  • Build, share & reuse workflows across teams

FuzzForge is open source, built to empower security teams, researchers, and the community.

🚧 FuzzForge is under active development. Expect breaking changes.


Support the Project

GitHub Stars

If you find FuzzForge useful, please star the repo to support development 🚀


Key Features

  • 🤖 AI Agents for Security Specialized agents for AppSec, reversing, and fuzzing
  • 🛠 Workflow Automation Define & execute AppSec workflows as code
  • 📈 Vulnerability Research at Scale Rediscover 1-days & find 0-days with automation
  • 🔗 Fuzzer Integration AFL, Honggfuzz, AFLnet, StateAFL & more
  • 🌐 Community Marketplace Share workflows, corpora, PoCs, and modules
  • 🔒 Enterprise Ready Team/Corp cloud tiers for scaling offensive security

📦 Installation

Requirements

Python 3.11+ Python 3.11 or higher is required.

uv Package Manager

curl -LsSf https://astral.sh/uv/install.sh | sh

Docker For containerized workflows, see the Docker Installation Guide.

Configure Docker Daemon

Before running docker compose up, configure Docker to allow insecure registries (required for the local registry).

Add the following to your Docker daemon configuration:

{
  "insecure-registries": [
    "localhost:5000",
    "host.docker.internal:5001",
    "registry:5000"
  ]
}

macOS (Docker Desktop):

  1. Open Docker Desktop
  2. Go to Settings → Docker Engine
  3. Add the insecure-registries configuration to the JSON
  4. Click "Apply & Restart"

Linux:

  1. Edit /etc/docker/daemon.json (create if it doesn't exist):
    sudo nano /etc/docker/daemon.json
    
  2. Add the configuration above
  3. Restart Docker:
    sudo systemctl restart docker
    

CLI Installation

After installing the requirements, install the FuzzForge CLI:

# Clone the repository
git clone https://github.com/fuzzinglabs/fuzzforge_ai.git
cd fuzzforge_ai

# Install CLI with uv (from the root directory)
uv tool install --python python3.12 .

Quickstart

Run your first workflow with Temporal orchestration and automatic file upload:

# 1. Clone the repo
git clone https://github.com/fuzzinglabs/fuzzforge_ai.git
cd fuzzforge_ai

# 2. Start FuzzForge with Temporal
docker-compose -f docker-compose.temporal.yaml up -d

The first launch can take 2-3 minutes for services to initialize

# 3. Run your first workflow (files are automatically uploaded)
cd test_projects/vulnerable_app/
fuzzforge init                           # Initialize FuzzForge project
ff workflow run security_assessment .    # Start workflow - CLI uploads files automatically!

# The CLI will:
# - Detect the local directory
# - Create a compressed tarball
# - Upload to backend (via MinIO)
# - Start the workflow on vertical worker

What's running:

Manual Workflow Setup

Manual Workflow Demo

Setting up and running security workflows through the interface

👉 More installation options in the Documentation.


AI-Powered Workflow Execution

LLM Workflow Demo

AI agents automatically analyzing code and providing security insights

📚 Resources


🤝 Contributing

We welcome contributions from the community!
There are many ways to help:

  • Report bugs by opening an issue
  • Suggest new features or improvements
  • Submit pull requests with fixes or enhancements
  • Share workflows, corpora, or modules with the community

See our Contributing Guide for details.


🗺️ Roadmap

Planned features and improvements:

  • 📦 Public workflow & module marketplace
  • 🤖 New specialized AI agents (Rust, Go, Android, Automotive)
  • 🔗 Expanded fuzzer integrations (LibFuzzer, Jazzer, more network fuzzers)
  • ☁️ Multi-tenant SaaS platform with team collaboration
  • 📊 Advanced reporting & analytics

👉 Follow updates in the GitHub issues and Discord.


📜 License

FuzzForge is released under the Business Source License (BSL) 1.1, with an automatic fallback to Apache 2.0 after 4 years.
See LICENSE and LICENSE-APACHE for details.

Languages
Python 95.7%
Makefile 3.1%
Dockerfile 1.2%