npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

openghost

v0.1.0

Published

**AI-powered penetration testing CLI that autonomously discovers and validates vulnerabilities across web applications, APIs, and network infrastructure.**

Readme

👻 OpenGhost

AI-powered penetration testing CLI that autonomously discovers and validates vulnerabilities across web applications, APIs, and network infrastructure.

License: Apache 2.0 CI

OpenGhost is an interactive, cost-efficient pentesting tool built in TypeScript + Bun using the Vercel AI SDK with Anthropic Claude. It follows the OWASP Web Security Testing Guide (WSTG) methodology and produces professional reports with full evidence.

~$5–10 per run · ~10–20 minute scans · Apache 2.0 licensed


Architecture: Brain + Hands

┌─────────────────────────────────────────────┐
│  🖥️  Host Machine (Brain)                   │
│                                             │
│  ┌───────────────────────────────────────┐  │
│  │  openghost CLI                        │  │
│  │  ├── Ghost Orchestrator (AI agent)    │  │
│  │  ├── Recon / Scanner / Exploit agents │  │
│  │  ├── Tool Manager (Zod schemas)       │  │
│  │  └── Findings Store (JSON on disk)    │  │
│  └──────────────────┬────────────────────┘  │
│                     │  execute(cmd)          │
│                     ▼                        │
│  ┌───────────────────────────────────────┐  │
│  │  Lab Executor                         │  │
│  │  (Docker · SSH · Local)               │  │
│  └──────────────────┬────────────────────┘  │
└─────────────────────┼───────────────────────┘
                      │
                      ▼
┌─────────────────────────────────────────────┐
│  🐳  Lab Environment (Hands)                │
│                                             │
│  Kali Linux + nmap, sqlmap, nuclei, ffuf,   │
│  gobuster, nikto, subfinder, httpx, dnsx,   │
│  Playwright + Chromium, OWASP ZAP           │
└─────────────────────────────────────────────┘

The CLI (brain) runs on your host machine — it handles AI reasoning, orchestration, and reporting. The lab (hands) is a Docker container with all offensive security tools pre-installed. The CLI never installs offensive tools on your host.


Quick Start

Prerequisites

1. Clone & Install

git clone https://github.com/openghost/openghost.git
cd openghost
bun install

2. Set Your API Key

export ANTHROPIC_API_KEY=sk-ant-...

3. Start the Lab

# Pull and start the Kali lab container
openghost lab start

4. Run a Scan

# Full scan against a target
openghost scan --target https://example.com

# With a config file for authenticated scanning
openghost scan --config openghost.json

# Interactive REPL mode
openghost chat --target https://example.com

5. View Results

# Findings are streamed to the terminal in real time
# Final report saved to ./openghost-results/report.md

# Regenerate report from existing findings
openghost report --input ./openghost-results/

Monorepo Structure

openghost/
├── common/               # Shared types, engine, tools, lab, findings, security
├── agents/               # Agent definitions, prompts, tool assignments
├── cli/                  # CLI entry point, commands, config loader
│
├── lab/                  # Lab environment (Dockerfile, docker-compose, scripts)
├── prompts/              # System prompt templates for each agent
├── configs/              # Example openghost.json configurations
├── prd/                  # Product requirement documents
├── docs/                 # Documentation (coming soon)
│
├── package.json          # Workspace root
├── tsconfig.base.json    # Shared TypeScript config
└── README.md             # ← You are here

| Workspace | Purpose | Key Dependencies | | --------- | ----------------------------------------------------------- | -------------------------------- | | common/ | Orchestration, agent runner, lab executors, tools, findings | ai, @ai-sdk/anthropic, zod | | agents/ | Agent definitions, system prompts, tool assignments | @openghost/common | | cli/ | Argument parsing, config loading, terminal UI | commander, chalk, ora |


How It Works

  1. Recon Phase — Parallel agents enumerate subdomains, scan ports, fingerprint technologies, and map endpoints.

  2. Scan Phase (adaptive) — Based on recon findings, the orchestrator spawns only relevant scanners: injection testing, XSS probing, auth testing, SSRF detection, and more.

  3. Exploit Phase (conditional) — If high/critical vulnerabilities are found, an exploit agent validates them with proof-of-concept attacks.

  4. Report Phase — A reporter agent compiles all findings into a professional markdown report with evidence, reproduction steps, and remediation guidance.

The pipeline is adaptive — the orchestrator analyzes findings after each phase and dynamically decides what to test next. No wasted cycles on irrelevant attack surfaces.


Example Configurations

See the configs/ directory for ready-to-use examples:


Documentation


Contributing

See CONTRIBUTING.md for development setup, prerequisites, and PR guidelines.


License

Apache License 2.0