Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> • <a href="#ui-overview">UI overview</a> • <a href="#architecture">Architecture</a> • <a href="#agent-pipeline">Agents</a> • <a href="#tools">Tools</a> • <a href="#llm-providers">LLM Providers</a> • <a href="#contributing">Contributing</a> & Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
RedWeaver is best for crewai, multi-agent workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB REPOS, runtime-metrics, public facts pack
Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> • <a href="#ui-overview">UI overview</a> • <a href="#architecture">Architecture</a> • <a href="#agent-pipeline">Agents</a> • <a href="#tools">Tools</a> • <a href="#llm-providers">LLM Providers</a> • <a href="#contributing">Contributing</a> &
Public facts
5
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Tarzeh
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Setup snapshot
Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Tarzeh
Protocol compatibility
OpenClaw
Adoption signal
1 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
4
Snippets
0
Languages
python
bash
# 1. Clone the repo git clone https://github.com/TarzEH/RedWeaver.git cd RedWeaver # 2. Configure API keys cp .env.example .env # Edit .env — add at least one LLM key (OpenAI, Anthropic, or Google) # 3. Build and run docker compose up --build # 4. Open the UI open http://localhost:5173
text
RedWeaver/ ├── backend/ │ └── app/ │ ├── api/ # FastAPI routes (chat, stream, runs, reports, settings) │ ├── core/ # Config, EventBus, LLM factory, dependency injection │ ├── crews/ # CrewAI crews (e.g. bug_hunt: YAML + builder) │ ├── domain/ # Domain entities │ ├── dto/ # API request/response shapes │ ├── graph/ # Hunt workflow graph (re-exports crew topology) │ ├── models/ # Run, huntflow, event payloads │ ├── reports/ # Report generation and templates │ ├── repositories/ # Redis-persisted data stores │ ├── services/ # Hunt execution, chat, keys management │ └── tools/ # CrewAI tools + cli/ wrappers ├── docs/ │ ├── ARCHITECTURE.md # Docker images vs folder layers │ └── screenshots/ # UI PNGs embedded above under “UI overview” ├── frontend/ │ └── src/ │ ├── app/ # Router, shell │ ├── components/ # layout, ui, domain │ ├── config/ # Provider/model definitions │ ├── contexts/ # Auth, Hunt │ ├── features/ # Route-level pages │ ├── hooks/ # useSSE, useRunStream │ ├── services/ # api.ts, http.ts (JWT client) │ └── types/ # TypeScript interfaces (API, events) ├── knowledge-service/ # RAG microservice (Chroma) ├── docker-compose.yml # Redis, backend, frontend, knowledge service, Redis Insight ├── backend/Dockerfile # Backend with security tools └── .env.example # Environment configuration template
bash
# Backend (requires Python 3.11+) cd backend pip install -r requirements.txt uvicorn app.main:app --reload --port 8000 # Frontend (requires Node 20+) cd frontend npm install npm run dev
bash
docker compose up --build
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB REPOS
Editorial quality
ready
Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> • <a href="#ui-overview">UI overview</a> • <a href="#architecture">Architecture</a> • <a href="#agent-pipeline">Agents</a> • <a href="#tools">Tools</a> • <a href="#llm-providers">LLM Providers</a> • <a href="#contributing">Contributing</a> &
RedWeaver is an autonomous vulnerability assessment platform that combines LLM reasoning with real security tools. You describe a target, and a team of AI agents collaboratively performs reconnaissance, crawling, fuzzing, vulnerability scanning, exploit analysis, and report generation — all streamed to your browser in real time.
Zero tool installation. Everything runs inside Docker. You only need an LLM API key.
The web UI is a React app (Vite) served behind nginx in Docker. After login you get:
| Area | What you use it for | |------|---------------------| | Dashboard | Hunt stats, severity breakdown, latest findings at a glance | | Hunt | Chat-driven hunts with live agent stream (SSE), in-thread pentest report, and agent flow panel | | Findings | Sortable vulnerability list with severity badges, CVE references, and evidence | | Sessions & Targets | Workspace-scoped projects, session management, and target tracking | | Knowledge Base | Searchable methodology library — techniques, commands, and patterns | | Settings | Multi-provider LLM configuration (OpenAI, Anthropic, Google, Ollama, Meta) |
PNG captures live under docs/screenshots/. When updating them, use masked or empty API-key fields and non-sensitive targets only — never commit real keys or private hostnames in images.
# 1. Clone the repo
git clone https://github.com/TarzEH/RedWeaver.git
cd RedWeaver
# 2. Configure API keys
cp .env.example .env
# Edit .env — add at least one LLM key (OpenAI, Anthropic, or Google)
# 3. Build and run
docker compose up --build
# 4. Open the UI
open http://localhost:5173
The API is exposed at http://localhost:8001 (host port mapped to the backend container). The UI talks to it through the frontend nginx proxy (/api). Type a target URL in the Hunt chat and the agents will start hunting.
On a fresh Redis volume, the backend seeds a demo admin so you can sign in immediately:
| Field | Value |
|-------|--------|
| Email | admin@redweaver.io |
| Password | redweaver |
Change this password (or register a new user and delete the demo account) before exposing the app beyond your machine. See SECURITY.md.
Tip: API keys can also be configured in the Settings page after launch — no
.envedits required.
The workflow graph is a dependency diagram: arrows show which agents consume outputs from others (e.g. many edges from Recon). It is not a Gantt chart. Branches do not mean “everything runs at the same time” — they mean “these steps all use data from Recon.” Actual execution follows the crew’s task list, with parallelism only where tools are independent and CrewAI’s async batching allows it.
The workflow graph may show an Orchestrator node for visualization only. Which agents run depends on target type (web vs host/network) and options (e.g. SSH post-exploit).
| Phase | Agent | What It Does | |:-----:|-------|-------------| | 1 | Recon | Subdomain enumeration, port scanning, tech fingerprinting | | 2a / 2b | Fuzzer · Vuln Scanner | Run in parallel after recon (async batch): fuzzing + nuclei/nikto | | 3 | Crawler | Endpoint discovery, JS analysis, form extraction (web targets; waits for fuzzer when present) | | 4 | Web Search | OSINT — CVE lookup, exploit databases, public disclosures | | 5 | Exploit Analyst | Attack chain correlation, risk assessment | | 6 | Report Writer | Structured Markdown report (methodology, findings, remediation) | | 7 | Privesc / Tunnel / Post-exploit | Optional when SSH targets are configured |
Phases are logical; the exact task order is defined in code (CrewFactory) and may differ slightly by target (e.g. no crawler on non-web targets).
All tools run as CLI binaries inside the Docker container — no external accounts or paid APIs needed.
| Tool | Category | Purpose | |------|----------|---------| | nmap | Recon | Port scanning, service detection | | subfinder | Recon | Subdomain enumeration | | httpx | Recon | HTTP probing, tech detection | | whatweb | Recon | Web technology fingerprinting | | theHarvester | OSINT | Email, subdomain, IP harvesting | | nuclei | Scanning | Template-based vulnerability scanning | | nikto | Scanning | Web server misconfiguration scanner | | ffuf | Fuzzing | Web fuzzer for directories and parameters | | gobuster | Fuzzing | Directory/DNS brute-forcing | | katana | Crawling | Web crawler for endpoint discovery |
RedWeaver supports multiple LLM providers. Configure via .env or the Settings UI at runtime.
| Provider | Models | Key Variable |
|----------|--------|-------------|
| OpenAI | GPT-4 family, GPT-4o, GPT-4o-mini (see Settings) | OPENAI_API_KEY |
| Anthropic | Claude Opus / Sonnet / Haiku (see Settings) | ANTHROPIC_API_KEY |
| Google | Gemini (see Settings) | GOOGLE_API_KEY |
| Ollama | Llama, Mistral, Qwen, etc. (local) | OLLAMA_BASE_URL |
At least one provider key is required. The cheapest models (GPT-4o-mini, Haiku, Gemini Flash) work well for most targets.
| Variable | Required | Description |
|----------|:--------:|-------------|
| OPENAI_API_KEY | * | OpenAI API key |
| ANTHROPIC_API_KEY | * | Anthropic API key |
| GOOGLE_API_KEY | * | Google Gemini API key |
| JWT_SECRET | Yes for production | Stable secret for signing auth tokens (random per boot if unset — sessions reset on restart) |
| OLLAMA_BASE_URL | No | Ollama server URL (default: http://host.docker.internal:11434) |
| REDIS_URL | No | Redis connection (default: redis://redis:6379/0 in Compose; host dev default often redis://localhost:6380/0) |
| KNOWLEDGE_SERVICE_URL | No | Knowledge RAG API (default in Compose: http://knowledge:8100) |
| CORS_ORIGINS | No | Allowed CORS origins (default: *) |
* At least one LLM provider key is required. Keys can also be set in the Settings UI.
RedWeaver/
├── backend/
│ └── app/
│ ├── api/ # FastAPI routes (chat, stream, runs, reports, settings)
│ ├── core/ # Config, EventBus, LLM factory, dependency injection
│ ├── crews/ # CrewAI crews (e.g. bug_hunt: YAML + builder)
│ ├── domain/ # Domain entities
│ ├── dto/ # API request/response shapes
│ ├── graph/ # Hunt workflow graph (re-exports crew topology)
│ ├── models/ # Run, huntflow, event payloads
│ ├── reports/ # Report generation and templates
│ ├── repositories/ # Redis-persisted data stores
│ ├── services/ # Hunt execution, chat, keys management
│ └── tools/ # CrewAI tools + cli/ wrappers
├── docs/
│ ├── ARCHITECTURE.md # Docker images vs folder layers
│ └── screenshots/ # UI PNGs embedded above under “UI overview”
├── frontend/
│ └── src/
│ ├── app/ # Router, shell
│ ├── components/ # layout, ui, domain
│ ├── config/ # Provider/model definitions
│ ├── contexts/ # Auth, Hunt
│ ├── features/ # Route-level pages
│ ├── hooks/ # useSSE, useRunStream
│ ├── services/ # api.ts, http.ts (JWT client)
│ └── types/ # TypeScript interfaces (API, events)
├── knowledge-service/ # RAG microservice (Chroma)
├── docker-compose.yml # Redis, backend, frontend, knowledge service, Redis Insight
├── backend/Dockerfile # Backend with security tools
└── .env.example # Environment configuration template
app/crews/bug_hunt/) with a Python CrewFactory that wires tools, structured outputs, and Process.sequential. Consecutive tasks marked async_execution run in parallel batches until the next synchronous task (e.g. fuzzer + vuln scanner after recon). The workflow graph is dependency-oriented, not a timeline.knowledge-base/; agents call knowledge_search for methodology (e.g. reporting). Compose wires KNOWLEDGE_SERVICE_URL to the knowledge container.# Backend (requires Python 3.11+)
cd backend
pip install -r requirements.txt
uvicorn app.main:app --reload --port 8000
# Frontend (requires Node 20+)
cd frontend
npm install
npm run dev
Or use Docker for everything:
docker compose up --build
RedWeaver is a security research and educational tool. Only use it against targets you own or have explicit permission to test. Unauthorized vulnerability scanning is illegal in most jurisdictions. The authors are not responsible for any misuse.
See CONTRIBUTING.md.
MIT © 2025-2026 Ori Ashkenazi
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_REPOS",
"generatedAt": "2026-04-17T03:34:18.336Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "crewai",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "multi-agent",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Tarzeh",
"href": "https://github.com/TarzEH/RedWeaver",
"sourceUrl": "https://github.com/TarzEH/RedWeaver",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:27.560Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:27.560Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "1 GitHub stars",
"href": "https://github.com/TarzEH/RedWeaver",
"sourceUrl": "https://github.com/TarzEH/RedWeaver",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:27.560Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to RedWeaver and adjacent AI workflows.