Skip to content

Crashwise: AI-powered fuzzing crash triage and security workflow automation.

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE
Unknown
LICENSE-APACHE
Notifications You must be signed in to change notification settings

yahyatoubali/Crashwise

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

92 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🚧 Crashwise is under active development

AI-powered workflow automation and AI Agents for AppSec, Fuzzing & Offensive Security

License: BSL 1.1 Python 3.11+ Version GitHub Stars

Overview β€’ Features β€’ Installation β€’ Quickstart β€’ AI Demo β€’ Contributing β€’ Roadmap


πŸš€ Overview

Crashwise helps security researchers and engineers automate application security and offensive security workflows with the power of AI and fuzzing frameworks.

  • Orchestrate static & dynamic analysis
  • Automate vulnerability research
  • Scale AppSec testing with AI agents
  • Build, share & reuse workflows across teams

Crashwise is open source, built to empower security teams, researchers, and the community.

🚧 Crashwise is under active development. Expect breaking changes.

Note: Fuzzing workflows (atheris_fuzzing, cargo_fuzzing, ossfuzz_campaign) are in early development. OSS-Fuzz integration is under heavy active development. For stable workflows, use: security_assessment, gitleaks_detection, trufflehog_detection, or llm_secret_detection.


✨ Key Features

  • πŸ€– AI Agents for Security – Specialized agents for AppSec, reversing, and fuzzing
  • πŸ›  Workflow Automation – Define & execute AppSec workflows as code
  • πŸ“ˆ Vulnerability Research at Scale – Rediscover 1-days & find 0-days with automation
  • πŸ”— Fuzzer Integration – Atheris (Python), cargo-fuzz (Rust), OSS-Fuzz campaigns
  • 🌐 Community Marketplace – Share workflows, corpora, PoCs, and modules
  • πŸ”’ Enterprise Ready – Team/Corp cloud tiers for scaling offensive security

⭐ Support the Project

GitHub Stars

If you find Crashwise useful, please star the repo to support development πŸš€


πŸ” Secret Detection Benchmarks

Crashwise includes three secret detection workflows benchmarked on a controlled dataset of 32 documented secrets (12 Easy, 10 Medium, 10 Hard):

Tool Recall Secrets Found Speed
LLM (gpt-5-mini) 84.4% 41 618s
LLM (gpt-4o-mini) 56.2% 30 297s
Gitleaks 37.5% 12 5s
TruffleHog 0.0% 1 5s

πŸ“Š Full benchmark results and analysis

The LLM-based detector excels at finding obfuscated and hidden secrets through semantic analysis, while pattern-based tools (Gitleaks) offer speed for standard secret formats.


πŸ“¦ Installation

Requirements

Python 3.11+ Python 3.11 or higher is required.

uv Package Manager

curl -LsSf https://astral.sh/uv/install.sh | sh

Docker For containerized workflows, see the Docker Installation Guide.

Configure AI Agent Credentials (Optional)

For AI-powered workflows, authenticate via OAuth (preferred):

cw oauth setup -p openai_codex
# or
cw oauth setup -p gemini_cli

Environment variables can still be used if your policy allows it:

cp volumes/env/.env.template volumes/env/.env
# Add provider keys only if you explicitly want env-based auth

This is required for:

  • llm_secret_detection workflow
  • AI agent features (cw ai agent)

Basic security workflows (gitleaks, trufflehog, security_assessment) work without this configuration.

CLI Installation

After installing the requirements, install the Crashwise CLI:

# Clone the repository
git clone https://github.com/YahyaToubali/Crashwise.git
cd Crashwise

# Install CLI with uv (from the root directory)
uv tool install --python python3.12 .

⚑ Quickstart

Run your first workflow with Temporal orchestration and automatic file upload:

# 1. Clone the repo
git clone https://github.com/YahyaToubali/Crashwise.git
cd Crashwise

# 2. Copy the default LLM env config
cp volumes/env/.env.template volumes/env/.env

# 3. Start Crashwise with Temporal
docker compose up -d

# 4. Start the Python worker (needed for security_assessment workflow)
docker compose up -d worker-python

The first launch can take 2-3 minutes for services to initialize β˜•

Workers don't auto-start by default (saves RAM). Start the worker you need before running workflows.

Workflow-to-Worker Quick Reference:

Workflow Worker Required Startup Command
security_assessment, python_sast, llm_analysis, atheris_fuzzing worker-python docker compose up -d worker-python
android_static_analysis worker-android docker compose up -d worker-android
cargo_fuzzing worker-rust docker compose up -d worker-rust
ossfuzz_campaign worker-ossfuzz docker compose up -d worker-ossfuzz
llm_secret_detection, trufflehog_detection, gitleaks_detection worker-secrets docker compose up -d worker-secrets
# 5. Run your first workflow (files are automatically uploaded)
cd test_projects/vulnerable_app/
cw init                           # Initialize Crashwise project
cw workflow run security_assessment .    # Start workflow - CLI uploads files automatically!

# The CLI will:
# - Detect the local directory
# - Create a compressed tarball
# - Upload to backend (via MinIO)
# - Start the workflow on vertical worker

What's running:

AI-Powered Workflow Execution

LLM Workflow Demo

AI agents automatically analyzing code and providing security insights

πŸ“š Resources


🀝 Contributing

We welcome contributions from the community!
There are many ways to help:

  • Report bugs by opening an issue
  • Suggest new features or improvements
  • Submit pull requests with fixes or enhancements
  • Share workflows, corpora, or modules with the community

See our Contributing Guide for details.


πŸ—ΊοΈ Roadmap

Planned features and improvements:

  • πŸ“¦ Public workflow & module marketplace
  • πŸ€– New specialized AI agents (Rust, Go, Android, Automotive)
  • πŸ”— Expanded fuzzer integrations (LibFuzzer, Jazzer, more network fuzzers)
  • ☁️ Multi-tenant SaaS platform with team collaboration
  • πŸ“Š Advanced reporting & analytics

πŸ‘‰ Follow updates in the GitHub issues


πŸ™Œ Attribution

Crashwise is based on the original open-source work of FuzzForge by FuzzingLabs. The project has been rebranded and extended, but we credit the original authors and community for the foundation.

πŸ“œ License

Crashwise is released under the Business Source License 1.1 (BSL). Production use requires a commercial license until the change date, when Apache 2.0 applies.
See LICENSE and LICENSE-APACHE for details.

About

Crashwise: AI-powered fuzzing crash triage and security workflow automation.

Resources

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE
Unknown
LICENSE-APACHE

Contributing

Stars

Watchers

Forks

Packages

No packages published