### Agent Audit Entry
*Quick access to Multi-Agent deep audit from homepage*
Audit Flow Logs
Real-time view of Agent thinking and execution process
Smart Dashboard
Grasp project security posture at a glance
Instant Analysis
Paste code / upload files, get results in seconds
Project Management
GitHub/GitLab import, multi-project collaboration
### Professional Reports
*One-click export to PDF / Markdown / JSON* (Quick mode shown, not Agent mode report)
[View Full Agent Audit Report Example](https://lintsinghua.github.io/)
---
## Overview
**DeepAudit** is a next-generation code security audit platform based on **Multi-Agent collaborative architecture**. It's not just a static scanning tool, but simulates the thinking patterns of security experts through autonomous collaboration of multiple agents (**Orchestrator**, **Recon**, **Analysis**, **Verification**), achieving deep code understanding, vulnerability discovery, and **automated sandbox PoC verification**.
We are committed to solving three major pain points of traditional SAST tools:
- **High false positive rate** — Lack of semantic understanding, massive false positives consume manpower
- **Business logic blind spots** — Cannot understand cross-file calls and complex logic
- **Lack of verification methods** — Don't know if vulnerabilities are actually exploitable
Users only need to import a project, and DeepAudit automatically starts working: identify tech stack → analyze potential risks → generate scripts → sandbox verification → generate report, ultimately outputting a professional audit report.
> **Core Philosophy**: Let AI attack like a hacker, defend like an expert.
## Why Choose DeepAudit?
| Traditional Audit Pain Points | DeepAudit Solutions |
| :--- | :--- |
| **Low manual audit efficiency** Can't keep up with CI/CD iteration speed, slowing release process | **Multi-Agent Autonomous Audit** AI automatically orchestrates audit strategies, 24/7 automated execution |
| **Too many false positives** Lack of semantic understanding, spending lots of time cleaning noise daily | **RAG Knowledge Enhancement** Combining code semantics with context, significantly reducing false positives |
| **Data privacy concerns** Worried about core source code leaking to cloud AI, can't meet compliance requirements | **Ollama Local Deployment Support** Data stays on-premises, supports Llama3/DeepSeek and other local models |
| **Can't confirm authenticity** Outsourced projects have many vulnerabilities, don't know which are truly exploitable | **Sandbox PoC Verification** Automatically generate and execute attack scripts, confirm real vulnerability impact |
---
## System Architecture
### Architecture Diagram
DeepAudit adopts microservices architecture, driven by the Multi-Agent engine at its core.
### Audit Workflow
| Step | Phase | Responsible Agent | Main Actions |
|:---:|:---:|:---:|:---|
| 1 | **Strategy Planning** | **Orchestrator** | Receive audit task, analyze project type, formulate audit plan, dispatch tasks to sub-agents |
| 2 | **Information Gathering** | **Recon Agent** | Scan project structure, identify frameworks/libraries/APIs, extract attack surface (Entry Points) |
| 3 | **Vulnerability Discovery** | **Analysis Agent** | Combine RAG knowledge base with AST analysis, deep code review, discover potential vulnerabilities |
| 4 | **PoC Verification** | **Verification Agent** | **(Critical)** Write PoC scripts, execute in Docker sandbox. Self-correct and retry if failed |
| 5 | **Report Generation** | **Orchestrator** | Aggregate all findings, filter out verified false positives, generate final report |
### Project Structure
```text
DeepAudit/
├── backend/ # Python FastAPI Backend
│ ├── app/
│ │ ├── agents/ # Multi-Agent Core Logic
│ │ │ ├── orchestrator.py # Commander: Task Orchestration
│ │ │ ├── recon.py # Scout: Asset Identification
│ │ │ ├── analysis.py # Analyst: Vulnerability Discovery
│ │ │ └── verification.py # Verifier: Sandbox PoC
│ │ ├── core/ # Core Config & Sandbox Interface
│ │ ├── models/ # Database Models
│ │ └── services/ # RAG, LLM Service Wrappers
│ └── tests/ # Unit Tests
├── frontend/ # React + TypeScript Frontend
│ ├── src/
│ │ ├── components/ # UI Component Library
│ │ ├── pages/ # Page Routes
│ │ └── stores/ # Zustand State Management
├── docker/ # Docker Deployment Config
│ ├── sandbox/ # Security Sandbox Image Build
│ └── postgres/ # Database Initialization
└── docs/ # Detailed Documentation
```
---
## Quick Start
### Option 1: One-Line Deployment (Recommended)
Using pre-built Docker images, no need to clone code, start with one command:
```bash
curl -fsSL https://raw.githubusercontent.com/lintsinghua/DeepAudit/v3.0.0/docker-compose.prod.yml | docker compose -f - up -d
```
> **Success!** Visit http://localhost:3000 to start exploring.
---
### Option 2: Clone and Deploy
Suitable for users who need custom configuration or secondary development:
```bash
# 1. Clone project
git clone https://github.com/lintsinghua/DeepAudit.git && cd DeepAudit
# 2. Configure environment variables
cp backend/env.example backend/.env
# Edit backend/.env and fill in your LLM API Key
# 3. One-click start
docker compose up -d
```
> First startup will automatically build the sandbox image, which may take a few minutes.
---
## Development Guide
For developers doing secondary development and debugging.
### Requirements
- Python 3.11+
- Node.js 20+
- PostgreSQL 15+
- Docker (for sandbox)
### 1. Backend Setup
```bash
cd backend
# Use uv for environment management (recommended)
uv sync
source .venv/bin/activate
# Start API service
uvicorn app.main:app --reload
```
### 2. Frontend Setup
```bash
cd frontend
pnpm install
pnpm dev
```
### 3. Sandbox Environment
Development mode requires pulling the sandbox image locally:
```bash
docker pull ghcr.io/lintsinghua/deepaudit-sandbox:latest
```
---
## Multi-Agent Intelligent Audit
### Supported Vulnerability Types
---
## Acknowledgements
Thanks to the following open-source projects for their support:
[FastAPI](https://fastapi.tiangolo.com/) · [LangChain](https://langchain.com/) · [LangGraph](https://langchain-ai.github.io/langgraph/) · [ChromaDB](https://www.trychroma.com/) · [LiteLLM](https://litellm.ai/) · [Tree-sitter](https://tree-sitter.github.io/) · [Kunlun-M](https://github.com/LoRexxar/Kunlun-M) · [Strix](https://github.com/usestrix/strix) · [React](https://react.dev/) · [Vite](https://vitejs.dev/) · [Radix UI](https://www.radix-ui.com/) · [TailwindCSS](https://tailwindcss.com/) · [shadcn/ui](https://ui.shadcn.com/)
---
## Important Security Notice
### Legal Compliance Statement
1. **Any unauthorized vulnerability testing, penetration testing, or security assessment is prohibited**
2. This project is only for cybersecurity academic research, teaching, and learning purposes
3. It is strictly prohibited to use this project for any illegal purposes or unauthorized security testing
### Vulnerability Reporting Responsibility
1. When discovering any security vulnerabilities, please report them through legitimate channels promptly
2. It is strictly prohibited to use discovered vulnerabilities for illegal activities
3. Comply with national cybersecurity laws and regulations, maintain cyberspace security
### Usage Restrictions
- Only for educational and research purposes in authorized environments
- Prohibited for security testing on unauthorized systems
- Users are fully responsible for their own actions
### Disclaimer
The author is not responsible for any direct or indirect losses caused by the use of this project. Users bear full legal responsibility for their own actions.
---
## Detailed Security Policy
For detailed information about installation policy, disclaimer, code privacy, API usage security, and vulnerability reporting, please refer to [DISCLAIMER.md](DISCLAIMER.md) and [SECURITY.md](SECURITY.md) files.
### Quick Reference
- **Code Privacy Warning**: Your code will be sent to the selected LLM provider's servers
- **Sensitive Code Handling**: Use local models for sensitive code
- **Compliance Requirements**: Comply with data protection and privacy laws
- **Vulnerability Reporting**: Report security issues through legitimate channels