@hackerai/local
v0.5.0
Published
HackerAI Local Sandbox Client - Execute commands on your local machine
Maintainers
Readme
@hackerai/local
HackerAI Local Sandbox Client - Execute commands on your local machine from HackerAI.
Installation
npx @hackerai/local@latest --token YOUR_TOKENOr install globally:
npm install -g @hackerai/local
hackerai-local --token YOUR_TOKENUsage
Basic Usage (Docker Mode)
npx @hackerai/local@latest --token hsb_abc123 --name "My Laptop"This pulls the pre-built HackerAI sandbox image (~3GB) - an AI Agent Penetration Testing Environment based on Kali Linux with comprehensive automated tools including: nmap, masscan, sqlmap, ffuf, gobuster, nuclei, hydra, nikto, wpscan, subfinder, httpx, smbclient, impacket, and many more.
Custom Docker Image
npx @hackerai/local@latest --token hsb_abc123 --name "Kali" --image kalilinux/kali-rollingDangerous Mode (No Docker)
npx @hackerai/local@latest --token hsb_abc123 --name "Work PC" --dangerousWarning: Dangerous mode runs commands directly on your host OS without isolation.
Options
| Option | Description |
| ------------------ | ------------------------------------------------------ |
| --token TOKEN | Authentication token from HackerAI Settings (required) |
| --name NAME | Connection name shown in HackerAI (default: hostname) |
| --image IMAGE | Docker image to use (default: hackerai/sandbox) |
| --dangerous | Run commands directly on host OS without Docker |
| --convex-url URL | Override backend URL (for development) |
| --help, -h | Show help message |
Getting Your Token
- Go to HackerAI Settings
- Navigate to the "Agents" tab
- Click "Generate Token" or copy your existing token
Security
- Docker Mode: Commands run in a container with process isolation, but with:
- Host network access (
--network host) for pentesting tools to scan network services - Linux capabilities for network tools:
NET_RAW: Required for ping, nmap, masscan, hping3, arp-scan, tcpdump, raw socketsNET_ADMIN: Required for network interface manipulation, arp-scan, netdiscoverSYS_PTRACE: Required for debugging tools (gdb, strace, ltrace)
- Host network access (
- Dangerous Mode: Commands run directly on your OS without any isolation - use with caution
License
MIT
