Alprina Documentation
Welcome to Alprina - AI-powered cybersecurity tool for developers. Build fast. Guard faster.
What is Alprina?
Alprina is an intelligent command-line security scanner that uses AI agents to detect vulnerabilities in your code, APIs, and infrastructure. It combines the power of automated scanning with AI-driven analysis to give you actionable security insights.
Key Features
- π€ AI-Powered Analysis - Intelligent vulnerability detection using advanced AI agents
- π» Local & Remote Scanning - Scan local files, remote APIs, and network targets
- π Authentication Flexible - Work offline with local scans or authenticated for remote targets
- π οΈ Mitigation Suggestions - Get AI-powered fix recommendations
- π Policy Engine - Define custom security policies for compliance
- π Multiple Report Formats - HTML, PDF, and JSON reports
- β‘ Fast & Efficient - Optimized for developer workflow
Quick Start
Get started with Alprina in 5 minutes:
# Install Alprina
pip install alprina-cli
# Authenticate (optional for local scans)
alprina auth login
# Run your first scan
alprina scan ./src
# Generate a report
alprina report --format htmlCore Commands
alprina scan <target> # Scan files, URLs, or IPs
alprina auth login # Authenticate with Alprina
alprina report # Generate security reports
alprina mitigate # Get fix suggestions
alprina policy init # Create security policies
alprina recon <target> # Perform reconnaissanceβ Complete Command Reference
Documentation Sections
Getting Started
Installation, authentication, and your first scan
CLI Reference
Complete documentation for all commands and options
Guides
Integration guides, CI/CD workflows, and best practices
Tutorials
Step-by-step learning paths from beginner to advanced
Example: Scanning a Local Directory
# Scan a local codebase
$ alprina scan ./my-app --profile code-audit
π‘οΈ Alprina Security Scan
βββββββββββββββββββββββββββββββββββ
π Starting scan on: ./my-app
Profile: code-audit
Mode: Safe only
β Detected local target: ./my-app
β Scanning local files...
β Scan complete!
Found 3 findings:
HIGH: Hardcoded API key in config.py
MEDIUM: SQL injection vulnerability in database.py
LOW: Outdated dependency: requests 2.25.0Need Help?
- π Read the installation guide
- π Try the quick start tutorial
- π¬ Join our communityΒ
- π Report issuesΒ
π‘οΈ Build fast. Guard faster.
Last updated on