Wiz – An Open Source AI-Powered Penetration Testing Assistant
Hacker News
Wiz is an open-source AI-powered coding agent designed to simplify penetration testing by eliminating the need to memorize complex command syntaxes for various security tools.
Hacker News
Wiz is an open-source AI-powered coding agent designed to simplify penetration testing by eliminating the need to memorize complex command syntaxes for various security tools.
AI 生成摘要
Wiz 是一個開源的 AI 驅動程式碼代理,旨在透過無需記憶各種安全工具複雜的指令語法,來簡化滲透測試的流程。
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
The open source coding agent.
Your AI Security Partner - Just describe what you need. No commands to memorize. No syntax to learn.
Security testing shouldn't require memorizing hundreds of tool flags and command syntaxes.
Think about it: nmap has 130+ options. Nuclei has dozens of flags. SQLMap has over 100 parameters. Now multiply that by the 30+ tools a typical assessment requires. That's not security work - that's a memorization exercise.
Wiz takes a different approach. Instead of learning tool syntax, you simply describe what you want to accomplish. The AI understands your intent and figures out which tools to use, how to chain them, and how to interpret the results.
No flags to remember. No syntax to look up. Just describe what you need.
Wiz is an AI-powered security operations assistant. You talk to it in plain English, and it:
Here's how a real conversation with Wiz looks:
Just describe what you need in your own words:
Wiz understands context too. After scanning a network, you can say "check that Apache server for vulnerabilities" - it knows which one you mean.
Yes, Claude CLI, Cursor, and other LLM tools can run commands too. So what makes Wiz different?
Wiz is built on OpenCode, which provides a superior agent architecture compared to generic LLM CLIs:
Better Agent Control - OpenCode's architecture gives finer control over LLM behavior, tool execution, and context management than Claude CLI's generic approach
Extensible Tool Framework - Not just "run bash commands" but structured tool definitions with typed inputs/outputs
Session Persistence - Real session management, not just chat history
Multi-LLM Support - Claude, GPT-4, Gemini, local models - your choice
Wiz extends OpenCode with a complete security operations layer:
OpenCode gives raw output. Wiz parses it:
Not just command history - structured security findings:
What OpenCode doesn't have:
Compliance-ready logging:
Professional deliverables, not chat exports:
Schedule recurring scans with diff detection:
Visual interface for findings management:
Claude CLI:
Wiz:
Wiz = OpenCode's superior agent + Security expertise + Findings management + Governance + Reporting
Let's be clear about boundaries:
Wiz is a tool, not a security expert replacement. It doesn't:
You are the security professional. Wiz handles the tedious parts so you can focus on analysis and decisions.
Wiz is built for:
It is NOT for:
The tools Wiz uses are powerful. Use them responsibly and legally.
Wiz won't:
It's an assistant that makes security work more efficient - not a shortcut around doing things properly.
The easiest way to get started. Download for your platform:
Wiz needs an AI provider to work. Set one of these:
For full functionality, have these tools installed (pre-installed on Kali/Parrot):
Don't have them? Wiz will tell you when it needs something.
Wiz offers multiple interfaces to fit your workflow:
Interactive command-line interface. Type naturally and see results directly.
Opens a web interface at http://localhost:4096. Features:
Development dashboard at http://localhost:5173. For contributors extending Wiz.
Reports are served through the web interface:
Features:
Wiz is under active development. Current capabilities:
Contributions welcome! See CONTRIBUTING.md.
Found a security issue? See SECURITY.md.
MIT License - See LICENSE
Wiz - Security testing should be about security, not syntax.
The open source coding agent.
There was an error while loading. Please reload this page.
2
0