@hackerai/local 0.7.0 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +2 -20
  2. package/package.json +1 -1
package/README.md CHANGED
@@ -17,22 +17,11 @@ hackerai-local --token YOUR_TOKEN
17
17
 
18
18
  ## Usage
19
19
 
20
- ### Basic Usage (Docker Mode)
21
-
22
20
  ```bash
23
21
  npx @hackerai/local@latest --token hsb_abc123 --name "My Laptop"
24
22
  ```
25
23
 
26
- This pulls the pre-built HackerAI sandbox image (~3GB) - an AI Agent Penetration Testing Environment based on Kali Linux with comprehensive automated tools including:
27
- nmap, masscan, sqlmap, ffuf, gobuster, nuclei, hydra, nikto, wpscan, subfinder, httpx, smbclient, impacket, and many more.
28
-
29
- ### Dangerous Mode (No Docker)
30
-
31
- ```bash
32
- npx @hackerai/local@latest --token hsb_abc123 --name "Work PC" --dangerous
33
- ```
34
-
35
- **Warning:** Dangerous mode runs commands directly on your host OS without isolation.
24
+ Commands run directly on your host OS. The client connects to HackerAI and relays commands in real-time.
36
25
 
37
26
  ## Options
38
27
 
@@ -40,7 +29,6 @@ npx @hackerai/local@latest --token hsb_abc123 --name "Work PC" --dangerous
40
29
  | ------------------ | ------------------------------------------------------ |
41
30
  | `--token TOKEN` | Authentication token from HackerAI Settings (required) |
42
31
  | `--name NAME` | Connection name shown in HackerAI (default: hostname) |
43
- | `--dangerous` | Run commands directly on host OS without Docker |
44
32
  | `--convex-url URL` | Override backend URL (for development) |
45
33
  | `--help, -h` | Show help message |
46
34
 
@@ -52,13 +40,7 @@ npx @hackerai/local@latest --token hsb_abc123 --name "Work PC" --dangerous
52
40
 
53
41
  ## Security
54
42
 
55
- - **Docker Mode**: Commands run in a container with process isolation, but with:
56
- - Host network access (`--network host`) for pentesting tools to scan network services
57
- - Linux capabilities for network tools:
58
- - `NET_RAW`: Required for ping, nmap, masscan, hping3, arp-scan, tcpdump, raw sockets
59
- - `NET_ADMIN`: Required for network interface manipulation, arp-scan, netdiscover
60
- - `SYS_PTRACE`: Required for debugging tools (gdb, strace, ltrace)
61
- - **Dangerous Mode**: Commands run directly on your OS without any isolation - use with caution
43
+ Commands run directly on your OS without any isolation. Only connect machines you trust and control. The client auto-terminates after 1 hour of inactivity.
62
44
 
63
45
  ## License
64
46
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@hackerai/local",
3
- "version": "0.7.0",
3
+ "version": "0.7.1",
4
4
  "description": "HackerAI Local Sandbox Client - Execute commands on your local machine",
5
5
  "bin": {
6
6
  "hackerai-local": "./dist/index.js"