Secalyze is an advanced AI-driven security tool designed to empower penetration testers, red team specialists, and cybersecurity engineers. While its primary focus is JavaScript vulnerability scanning, Secalyze offers versatile capabilities for a wide range of security tasks including secrets detection, endpoint discovery, cloud bucket analysis, and custom security automation.
- Deep JavaScript Analysis: Detect XSS, code injection, hardcoded secrets, and sensitive data exposure in JS code
- Multi-Purpose Security Engine: Perform custom security assessments using YAML templates
- Automation-Ready Workflows: Process single targets or batch operations with structured reporting
- AI-Powered JavaScript Scanning: Uses Gemini AI to analyze JavaScript for security vulnerabilities.
- Customizable Templates: YAML templates for specific vulnerability detection tasks.
- Multiple Input Sources: Scan single URLs, local files, or batch process multiple files.
- Professional Reporting: Generate reports with prioritized findings and remediation guidance.
- Proxy Support: Configure proxy settings for scanning through corporate networks.
git clone https://github.com/KaulikMakwana/SecAlyze.git
cd Secalyze
# Create and activate a virtual environment (recommended)
python3 -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt
python Secalyze.pypython Secalyze.py -u https://example.com -t TEMPLATES/js_vulnerability.yamlpython Secalyze.py -f path/to/local/file.js -t TEMPLATES/js_vulnerability.yamlpython Secalyze.py -f urls.txt -t TEMPLATES/api_keys_finder.yamlpython Secalyze.py -u https://example.com -t TEMPLATES/api_keys_finder.yamlpython Secalyze.py -f nmap-result.txt -p 'Extract All open ports : example 12,22,23.. and then list target service specific pentest tools commands' -mimetype yaml -o output.yaml python Secalyze.py -p 'What is the capital of France?' -system 'You are a helpful assistant.' __
.-/ \__
/ @`---.
| (*) .'
\__/`--'---' .---. .----. .-. .-..----. .---.
/ / ___| {_} |/ {} \ | `-' || {} }| {_}
/_.' /__/|____/ \______/ |__/|__/|___.' |_|
AI-Powered JS Vulnerability Scanner β’ Red Team CLI Interface
usage:
> python3 Secalyze.py -url 'https://example.com/' -p 'Analyse JS scripts and enumerate any Vulns if Exists...' -mimetype text -o JSVulns
> python3 Secalyze.py -f JSurls.json -p 'Analyze this content for exposed API keys and secrets' -mimetype json -o APIKeys
> python3 Secalyze.py -t TEMPLATES/endpoint_discovery.yaml -f files.json -mimetype x.enum -o endpoints.txt
Secalyze - AI-Powered Multi-Purpose Security Assessment & Automation
CLI
options:
-h, --help show this help message and exit
--update Check for and install the latest version from GitHub
--version Show Secalyze version and exit
Input Options:
-url, --url URL target URL ....
-f, --file FILE json file contains target links...
AI Model Configuration:
-system, --system_instruction SYSTEM_INSTRUCTION
System instruction for AI model. Default: Expert red
team operator instruction
-p, --prompt PROMPT Prompt for AI model
-mimetype, --response_mime_type RESPONSE_MIME_TYPE
Response MIME type for AI model output. Accepts: json,
text, xml, yaml, x.enum, etc. (or full MIME type)
-m, --model MODEL gemini genai model to use.. default: gemini-2.5-flash
| gemini-2.5-pro
Template Options:
-t, --template TEMPLATE_FILE
YAML template file for specialized security tasks
Output Configuration:
-o, --output OUTPUT Output filename
-filemode, --filemode FILEMODE
File mode for saving output. 'w' for overwrite, 'a'
for append. Default: 'a'
Network Configuration:
-retry, --max_retries MAX_RETRIES
Maximum retries for HTTP requests
-delay, --retry_delay RETRY_DELAY
Delay between retries
Secalyze uses YAML templates to define scanning tasks. These templates control the AI's behavior, the task instructions, and the output validation.
python Secalyze.py -u https://example.com -t TEMPLATES/js_vulnerability.yaml- Copy an existing template from the
TEMPLATESdirectory. - Modify the following fields:
system_instruction: Define the AI's role and task.task_config: Set the prompt and any task-specific parameters.model_config: Configure the model and output format.validation(optional): Add rules to validate the AI's output.
- Save the new template in the
TEMPLATESdirectory and run Secalyze with the-toption.
- Static Analysis Only: Secalyze performs static analysis of JavaScript code and does not execute the code or perform dynamic testing.
- Model Dependency: The quality of results depends on the underlying Google Gemini AI models.
- API Key Required: You must provide a Google Gemini API key to use this tool.
- Support for Additional AI Models: Integration with OpenAI, Anthropic, and local LLMs.
- Interactive Vulnerability Explorer: A web-based interface for exploring and prioritizing findings.
- Functional Calling: Workflow automation through AI function calling.
- Enhanced Reporting: PDF and HTML report generation.
- CI/CD Integration: Seamless integration with popular CI/CD platforms.
Secalyze is for authorized security testing only. Do not use for illegal activities.

