Solo desktop
For individual researchers. Electron app bundles the frontend, Express server, MCP server, and SQLite — everything is local.
- Fully offline-capable
- First-launch wizard picks your mode
- Desktop AI keys encrypted at rest (AES-256-GCM)
One codebase, three shapes. Solo ships as an Electron installer for all three desktop OSes. Team runs as a multi-arch Docker image (linux/amd64 + linux/arm64) or a bare-metal tarball with systemd / Windows-service automation. Every binary ships with a SHA-256 you can verify.
For individual researchers. Electron app bundles the frontend, Express server, MCP server, and SQLite — everything is local.
Pre-built multi-arch image on GitHub Container Registry. Runs on anything that runs Docker.
347 KB tarball for shops that don't run Docker. Creates a systemd unit on Linux, a launchd plist on macOS, or a Windows service.
# 1 · pull the pre-built multi-arch image (linux/amd64 + linux/arm64)
docker pull ghcr.io/asafmeizner/vulnforge-server:0.1.0
# 2 · grab the compose file + env template
curl -O https://raw.githubusercontent.com/AsafMeizner/vulnforge/v0.1.0/docker-compose.server.yml
curl -O https://raw.githubusercontent.com/AsafMeizner/vulnforge/v0.1.0/.env.server.example
# 3 · configure
cp .env.server.example .env.server
# edit: VULNFORGE_PUBLIC_URL, generate VULNFORGE_JWT_SECRET + VULNFORGE_BOOTSTRAP_TOKEN
# 4 · bring up the stack
docker compose -f docker-compose.server.yml --env-file .env.server up -d
# 5 · grab the bootstrap token (printed once on first start)
docker logs vulnforge-server
# on your desktop: wizard → Team → paste server URL + tokencurl -LO https://github.com/AsafMeizner/vulnforge/releases/download/v0.1.0/vulnforge-server-0.1.0.tar.gz
tar xzf vulnforge-server-0.1.0.tar.gz
sudo ./scripts/install-server.sh
# preflights Node 20+ / Python / git,
# generates JWT + bootstrap secrets,
# creates systemd service,
# runs migrations,
# prints bootstrap tokenInvoke-WebRequest -Uri https://github.com/AsafMeizner/vulnforge/releases/download/v0.1.0/vulnforge-server-0.1.0.tar.gz -OutFile vulnforge-server-0.1.0.tar.gz
tar xzf vulnforge-server-0.1.0.tar.gz
# run PowerShell as Administrator:
.\scripts\install-server.ps1
# creates a Windows serviceEvery binary on the release page has a SHA-256 entry in SHA256SUMS.txt. Cross-check before running.
# download the checksum file alongside the installers
curl -LO https://github.com/AsafMeizner/vulnforge/releases/download/v0.1.0/SHA256SUMS.txt
# verify every binary in one shot
sha256sum -c SHA256SUMS.txt
# expected: one "OK" per line, one line per binaryThe vulnforge CLI is a zero-dep Node script bundled with every desktop install + the server tarball. Works against a local VulnForge or a remote one via VULNFORGE_API_BASE.
# the vulnforge CLI ships with every desktop install AND
# inside the server tarball (bin/vulnforge wraps cli/vulnforge.mjs).
# quick status from any terminal
vulnforge status
# tail findings live
vulnforge findings --follow
# trigger an AI triage on a scan finding
vulnforge triage <finding-id>
# launch a hunt against a git URL
vulnforge hunt https://github.com/org/repo
# point at a remote VulnForge
VULNFORGE_API_BASE=https://vulnforge.acme.corp vulnforge statusAfter install: Hunt → paste a GitHub URL → Start. Watch the full pipeline run. Review findings. No sign-up, no telemetry, nothing to configure to get started.
See what you can do