Autonomous bug bounty hunting powered by the Claude Agent SDK. One command, six specialist AI agents, real vulnerability findings.
bountyhunt hunt --platform hackerone --program <handle>
An orchestrator agent (Claude Opus) coordinates six specialist agents to run a full bug bounty workflow autonomously:
- Scope Analyzer — Parses program scope from HackerOne/Bugcrowd, identifies targets, wildcards, and exclusions
- Recon Agent — Subdomain enumeration, live host probing, URL crawling, header/SSL analysis
- Web Vuln Agent — Tests for XSS, SQLi, IDOR, SSRF, open redirects, auth bypass, known CVEs
- API Vuln Agent — Tests REST/GraphQL APIs for BOLA, mass assignment, JWT flaws, rate limit bypass
- Source Review Agent — Analyzes JavaScript, scans for exposed secrets, audits dependencies
- Report Writer — Deduplicates findings, assigns CVSS/CWE, generates submission-ready markdown
Each agent has restricted tool access — the recon agent can't make HTTP requests, the API agent can't run nuclei scans. Security boundaries are enforced at the SDK level.
CLI (argparse)
└── Runner (orchestrator prompt + SDK config)
└── Claude Agent SDK query()
├── Orchestrator (Opus) — delegates via Task tool
│ ├── scope-analyzer (Sonnet)
│ ├── recon-agent (Sonnet)
│ ├── web-vuln-agent (Opus)
│ ├── api-vuln-agent (Opus)
│ ├── source-review-agent (Sonnet)
│ └── report-writer (Sonnet)
│
└── 6 MCP Servers (19 tools total)
├── recon: subfinder, httpx, katana, header/ssl checks
├── scanner: nuclei
├── http: rate-limited HTTP client
├── scope: scope loading, validation
├── source: JS analysis, secret scanning, dependency audit
└── report: finding storage, report generation
Findings are stored incrementally to disk as JSON — if the hunt crashes or you interrupt it, nothing is lost.
- Python 3.11+
- Claude Agent SDK
- External tools (install via Go): subfinder, httpx, nuclei, katana
git clone https://github.com/eliBenven/aibugbounty.git
cd aibugbounty
pip install -e ".[dev]"
# Copy and edit config
cp config.example.yaml config.yaml
# Edit config.yaml with your tool paths (or leave null for auto-detect from PATH)
# Set your API key
export ANTHROPIC_API_KEY=sk-ant-...go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
go install -v github.com/projectdiscovery/katana/cmd/katana@latestbountyhunt hunt --platform hackerone --program <program-handle>bountyhunt hunt --url https://example.com --url https://api.example.combountyhunt scope <program-handle> --platform hackeronebountyhunt report --findings-dir data/findings/<program> --program-name "Program Name"--mode passive|active|full Hunt mode (default: full)
--budget 10.00 Override max API budget in USD
--verbose Show full agent messages
The orchestrator runs 5 phases:
- Scope — Delegates to scope-analyzer to parse and validate the program scope
- Recon — Delegates to recon-agent to enumerate subdomains, probe live hosts, crawl URLs
- Vulnerability Testing — Launches web-vuln, api-vuln, and source-review agents in parallel with specific targets from recon
- Follow-up — Investigates interesting leads from phase 3
- Report — Delegates to report-writer to compile and deduplicate all findings
Every finding requires concrete evidence (HTTP requests/responses, tool output) — the system rejects findings without proof.
See config.example.yaml for all options:
- Model assignments — Which Claude model each agent uses
- Rate limiting — HTTP requests per minute (sliding window)
- Budget cap — Maximum API spend per hunt
- Tool paths — Paths to Go tools (auto-detected from PATH if null)
- Nuclei settings — Rate limit, concurrency, severity filter
pytest tests/ -v58 tests covering models, parsers, tools, config, and SDK size limits.
A typical full hunt runs 30-40 turns and costs $5-15 depending on scope size and number of targets. The --budget flag lets you set a hard cap.
This tool is intended for authorized security testing only.
- Only use this tool against programs and targets where you have explicit authorization to test
- Respect all bug bounty program rules, rate limits, and scope boundaries
- The tool includes rate limiting and scope validation, but you are responsible for ensuring your testing is authorized
- The authors are not responsible for misuse of this tool or any unauthorized testing
- Findings should be reported through proper disclosure channels (HackerOne, Bugcrowd, etc.)
This tool performs active security testing including subdomain enumeration, web crawling, vulnerability scanning, and HTTP request fuzzing. Running it against targets without authorization may violate computer fraud and abuse laws.
MIT — see LICENSE.