Everything you need to integrate Kensai into your security workflow. AI-powered scanning, 300K+ CVEs, and automated remediation.
Install the Kensai CLI for local scanning.
npm i -g @aihackers/kensai-cliScan a URL, repo, or local code.
kensai scan https://example.com/v1/scan—Start a new security scan/v1/scans/:id—Get scan status and results/v1/scans—List all scans for organization/v1/scans/:id—Cancel a running scan/v1/cves/search—Search CVEs with filters (severity, CWE, ecosystem)/v1/cves/:cveId—Get detailed CVE information/v1/cves/package/:ecosystem/:name—Get CVEs affecting a package/v1/cves/stats—Database statistics💡 Auto-updated: CVE database syncs every 4 hours from NVD, OSV, and GitHub Advisories.
/v1/deps/analyze—Analyze dependencies for vulnerabilities/v1/sbom/generate—Generate CycloneDX or SPDX SBOM/v1/fix/generate—Generate AI-powered fix for vulnerability/v1/github/comment—Post fix as GitHub PR comment/v1/reports/generate—Generate PDF, HTML, JSON, or SARIF report/v1/reports/:id—Get report status/v1/reports/:id/download—Download generated report/v1/auth/register—Create new account/v1/auth/login—Get JWT token/v1/auth/api-keys—Create API key/v1/auth/api-keys—List API keys/v1/auth/api-keys/:id—Revoke API key/v1/billing/plans—List available plans/v1/billing/checkout—Create Stripe checkout session/v1/billing/portal—Get customer portal URL/v1/billing/subscription—Get current subscription/v1/billing/usage—Get usage statistics/v1/github/connect—Connect GitHub App/v1/github/webhook—GitHub webhook handler/v1/integrations/slack/webhook—Configure Slack notifications/v1/integrations/jira/connect—Connect Jira for ticket creation/v1/analytics/dashboard—Get dashboard statistics/v1/analytics/trends—Vulnerability trends over timenpm install -g @aihackers/kensai-cli
# or
pnpm add -g @aihackers/kensai-cli# Login with API key
kensai login --api-key YOUR_API_KEY
# Check config
kensai config --list# Scan a URL
kensai scan https://example.com
# Scan a GitHub repo
kensai scan https://github.com/user/repo
# Scan local code
kensai scan ./my-project
# With options
kensai scan ./src --format json --output results.json --fail-on high# Search CVEs
kensai cve "log4j"
kensai cve --severity CRITICAL --limit 20
# Check specific CVE
kensai cve CVE-2021-44228# Generate report
kensai report SCAN_ID --type technical --format pdf
# Generate SBOM
kensai sbom ./my-project --format cyclonedx# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Run Kensai Security Scan
uses: aihackers/kensai-action@v1
with:
api-key: ${{ secrets.KENSAI_API_KEY }}
scan-type: repo
fail-on: high
comment-on-pr: trueAdd KENSAI_API_KEY to your repository secrets.
Our team is here to help you get the most out of Kensai.