Documentation Index
Fetch the complete documentation index at: https://kai.dria.co/docs/llms.txt
Use this file to discover all available pages before exploring further.
Kai Security
Adversarial testing with proof-of-concept verification. Every vulnerability proven in a sandbox before Kai opens the PR. Kai Security uses specialized AI agents to discover security issues in your codebase, verify each finding by generating and testing actual exploit code, and suggest targeted fixes. If Kai can’t create a working exploit, it doesn’t report the vulnerability. Zero false positives. Patches ready to merge.How It Works
- Scan: Agents analyze your codebase to understand its structure, entry points, and business logic
- Find: Specialized agents search for different types of vulnerabilities using advanced reasoning
- Prove: Each potential vulnerability is tested with working exploit code in a sandbox to confirm it’s real
- Fix: Verified vulnerabilities get targeted patches, tested to ensure they work
- Review: Every change lands as a PR with exploit proof, not a confidence score
Key Capabilities
- Sandboxed exploit generation: Every finding is proven with working proof-of-concept code
- Zero false positives: No working exploit, no report
- 10+ languages, 20+ frameworks: JavaScript, Python, Go, Rust, Solidity, TypeScript, Java, Swift, and more
- Patches ready to merge: Targeted fixes with before/after diffs
- Parallel agents: Dozens of agents work simultaneously, completing in hours what takes teams days
Where to Use Kai Security
Kai Security is available across all Kai surfaces:- VS Code Extension: Scan directly from your IDE, review findings inline, view fix diffs, and create issues from exploits
- Web Dashboard: Manage vulnerabilities with the Kanban board, collaborate with your team, generate audit reports, and track analytics
- MCP Server: Run scans, review exploits, and create issues programmatically from any MCP-compatible client
Next Steps
- Running Your First Scan - Complete walkthrough of the scanning process
- Understanding Results - Deep dive into vulnerability reports
- Managing Vulnerabilities - Master the Kanban workflow
- Scan Modes - Choose the right analysis depth
- Security Reports - Generate audit reports from completed scans