npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@suvijya/kevin

v1.1.4

Published

AI-powered dev assistant & cybersecurity agent

Downloads

687

Readme


🔐 What is Kevin?

Kevin is an open-source, terminal-native AI cybersecurity specialist built for security professionals, penetration testers, bug bounty hunters, and developers who take security seriously.

Kevin isn't a general-purpose chatbot. Kevin is a focused, sharp, no-nonsense security expert that lives in your terminal — ready to audit your code, hunt vulnerabilities, harden your infrastructure, and guide you through offensive and defensive operations.

Think of Kevin as your senior pentester on a caffeine drip — available 24/7.

🎯 Key Capabilities

  • 🔴 Offensive Security — Recon, enumeration, exploit development, attack chaining, privilege escalation, evasion techniques.
  • 🔵 Defensive Security — Hardening, detection engineering, incident response, threat hunting, forensics, compliance.
  • 🟣 Purple Team Ops — Adversarial simulation with simultaneous detection validation and coverage mapping.
  • 🛡️ Code Auditing — OWASP Top 10 scanning, secret detection, dependency vulnerability analysis, crypto auditing.
  • 📋 Professional Reporting — CVSS scoring, MITRE ATT&CK mapping, compliance gap analysis, vulnerability reports.

⚡ Quick Start

📦 Installation

Kevin is distributed as a high-performance native binary via NPM. You do not need Bun or Node installed to run it (only to install it).

# Install globally via NPM
npm install -g @suvijya/kevin

# Or run instantly without installing
npx @suvijya/kevin

Once installed, launch Kevin from any terminal:

[!TIP] Remove versions older than 0.1.x before installing.

Once installed, launch Kevin:

kevin

Kevin will greet you with:

"Kevin online. Cybersecurity specialist, ready to hunt. What are we breaking — or fixing — today?"

| Platform | Download | | :--- | :--- | | macOS (Apple Silicon) | kevin-desktop-darwin-aarch64.dmg | | macOS (Intel) | kevin-desktop-darwin-x64.dmg | | Windows | kevin-desktop-windows-x64.exe | | Linux | .deb, .rpm, or AppImage |


🤖 Specialized Security Agents

Kevin now features a registry of specialized agents tailored for different security workflows. Mention them using @ to switch personas:

| Agent | Purpose | Networking | | :--- | :--- | :--- | | @advisor | Passive analysis, code review, and safe discovery. | Offline | | @audit | Compliance checks and static vulnerability scanning. | Private | | @lab | Experimental research and local network/LAN testing. | Host/LAN | | @engagement | Active offensive operations (requires scope). | Scoped |


🏗️ Secure Docker Sandbox

Kevin executes all security tools (nmap, nuclei, semgrep, etc.) inside a hardened Docker sandbox. This ensures your host machine remains untouched and provides a clean, isolated environment for every scan.

🛡️ Security Features:

  • No-Root Execution: Tools run as a non-privileged kevin user.
  • Capability Dropping: All dangerous Linux capabilities are dropped by default.
  • Smart-Networking: Automatically promotes to host networking for local/LAN scans while keeping external scans isolated.
  • Policy Enforcement: Built-in guardrails prevent accidental damage and enforce scope boundaries.

🚀 Sandbox Setup:

Before your first scan, initialize the security environment (Ensure that docker is running in your system):

kevin sandbox build

⚔️ Slash Commands

🔍 Reconnaissance & Analysis

| Command | Description | | :--- | :--- | | /recon <target> | Passive recon — subdomains, DNS, WHOIS, tech stack fingerprinting | | /enumerate <target> | Active enumeration — directories, parameters, API endpoints, users | | /attack-surface | Map every input, endpoint, trust boundary, and external dependency | | /headers <url> | Analyze HTTP security headers and grade them | | /cve <software> | Look up known CVEs ranked by severity |

🛡️ Code Auditing & Hardening

| Command | Description | | :--- | :--- | | /audit | Deep security audit — OWASP Top 10, injection points, logic flaws | | /secrets | Scan for leaked API keys, tokens, passwords, private keys | | /harden <file> | Suggest security hardening for a specific file or configuration | | /deps | Analyze project dependencies for known vulnerabilities | | /crypto-check | Audit cryptographic implementations and algorithms |


🏗️ Technical Edge

  • 100% Open Source: No black boxes. Audit the auditor.
  • Provider Agnostic: Use Kevin with Claude, OpenAI, Gemini, or local models (Ollama/Llama.cpp).
  • LSP Integration: Out-of-the-box support for language servers and deep code understanding.
  • TUI Focused: Built by neovim users for terminal power users. High-performance terminal interface.
  • Remote Ops: Client/server architecture allows driving Kevin remotely from any interface.

⚖️ License

Kevin is released under the MIT License.


Credits: https://github.com/anomalyco/opencode

Join the Protocol: Discord | X.com | Documentation