Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Sandyaa: Open-source autonomous security bug hunter
    Cybersecurity

    Sandyaa: Open-source autonomous security bug hunter

    adminBy adminMay 13, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Sandyaa: Open-source autonomous security bug hunter
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Source code auditing has traditionally relied on static analyzers that flag long lists of potential issues, leaving engineers to sort bugs from noise. A new open-source project from offensive-security firm SecureLayer7 takes a different route, using LLMs to read a codebase, trace how data moves through it, and produce working exploit code for the vulnerabilities it confirms. Their open-source tool, called Sandyaa, was released under an MIT license.

    sandyaa autonomous security bug hunter

    How the auditor operates

    Sandyaa accepts either a local directory or a Git URL and runs the audit end to end with no interactive prompts. It builds context across files, splits large codebases into chunks sized to code density and token budget, and runs recursive analysis passes that revisit the same code multiple times to refine findings. Each confirmed bug is written to a findings/ folder containing an analysis write-up, a Python proof-of-concept, a setup guide, and an evidence.json file that links every claim back to specific file paths and line numbers.

    Eight recursive phases drive the analysis: call-chain tracing, data-flow expansion, self-verification, vulnerability chaining, proof-of-concept refinement, contradiction detection, assumption validation, and exploitability proof. A separate attacker-control analyzer drops findings that cannot be reached from untrusted input, reducing noise from theoretical issues.

    Sandyaa looks for memory-safety bugs including use-after-free, buffer overflow, type confusion, and double-free; logic bugs such as authentication bypass, TOCTOU, and state machine errors; injection vulnerabilities including SQL, command, XSS, SSRF, and path traversal; cryptographic misuse; concurrency races; integer overflow and signedness issues; and unsafe APIs including deserialization, XXE, and prototype pollution.

    Building trust in the output

    SecureLayer7 began running Sandyaa against live targets only after tightening the verification stack to the point where reviewing tool output became more productive than reading code from scratch. Sandeep Kamble, CTO at SecureLayer7, told Help Net Security that the team “kept tightening the verification pipeline self-verification, vulnerability chaining, contradiction detection, and an attacker-control filter that drops findings unreachable from untrusted input.” He added that the threshold for adoption was practical: “At some point the false-positive rate really low enough that reviewing Sandyaa output was a better use of researcher time than reading code cold.”

    Two bugs surfaced by the tool have been publicly disclosed so far, both in the Spring AI project: a SQL injection in MariaDBFilterExpressionConverter and a JSONPath injection in PgVectorStore AbstractFilterExpressionConverter.

    Safety around exploit execution

    Sandyaa can run the proof-of-concept code it generates to confirm exploitability, a behavior that raises obvious questions about side effects on unfamiliar codebases. Kamble said execution is gated by default: “PoC execution is opt-in, off by default. The attacker-control filter runs before PoC generation, so we don’t build PoCs for paths that aren’t reachable anyway.”

    No API key, with Gemini as an option

    Sandyaa piggybacks on a user’s existing Claude Code session. Once a developer is logged into the Claude Code CLI, Sandyaa reuses that authentication and requires no ANTHROPIC_API_KEY. Some analysis phases can run on Gemini if the gemini CLI is on the user’s PATH, again with no API key required. Setting GEMINI_API_KEY is supported only for resolving model tiers at startup.

    The architecture relies on what the project calls Recursive Language Models. The model drives a Python REPL that runs regex filters, chunks files, and spawns sub-LLM queries, with results aggregated in code. This design lets the tool process repositories larger than a single context window would allow.

    Platform support and status

    The project is actively tested on macOS. Linux should work but has not been validated. Native Windows is not supported because Sandyaa shells out using Unix-only commands and spawns the Claude CLI directly; users on Windows can run it through WSL2. Requirements include Node.js 18 or newer, git, and a logged-in Claude Code installation. Configuration lives in .sandyaa/config.yaml, where users set the target path, chunk size, minimum severity, exploitability threshold, and output options.

    Sandyaa is available for free on GitHub.

    Must read:

    Subscribe to the Help Net Security ad-free monthly newsletter to stay informed on the essential open-source cybersecurity tools. Subscribe here!

    autonomous bug Hunter opensource Sandyaa Security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAI Answers That Do More Than Sound Plausible
    Next Article [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
    admin
    • Website

    Related Posts

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google expands Universal Commerce Protocol and launches new agentic shopping tools

    May 21, 2026

    What is PPC? A starter guide to pay-per-click advertising

    May 21, 2026

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026

    Best AI search analytics tools for marketing teams

    May 21, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,220)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google expands Universal Commerce Protocol and launches new agentic shopping tools

    May 21, 2026

    What is PPC? A starter guide to pay-per-click advertising

    May 21, 2026

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026
    Most Popular
    • Google expands Universal Commerce Protocol and launches new agentic shopping tools
    • What is PPC? A starter guide to pay-per-click advertising
    • WordPress 7.0 Launches With Native AI Integration
    • Best AI search analytics tools for marketing teams
    • Google tests new conversational ad formats in AI Mode and Search
    • How to measure AI search visibility: KPIs & reporting
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.