██╗ ██╗██╗ ██╗██╗ ███╗ ██╗██╗ ██╗██╗ ██╗███╗ ██╗████████╗███████╗██████╗
██║ ██║██║ ██║██║ ████╗ ██║██║ ██║██║ ██║████╗ ██║╚══██╔══╝██╔════╝██╔══██╗
██║ ██║██║ ██║██║ ██╔██╗ ██║███████║██║ ██║██╔██╗ ██║ ██║ █████╗ ██████╔╝
╚██╗ ██╔╝██║ ██║██║ ██║╚██╗██║██╔══██║██║ ██║██║╚██╗██║ ██║ ██╔══╝ ██╔══██╗
╚████╔╝ ╚██████╔╝███████╗██║ ╚████║██║ ██║╚██████╔╝██║ ╚████║ ██║ ███████╗██║ ██║
╚═══╝ ╚═════╝ ╚══════╝╚═╝ ╚═══╝╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═══╝ ╚═╝ ╚══════╝╚═╝ ╚═╝
Your dependencies have secrets. VulnHunter finds them.
Offline vulnerability scanner with AI-powered triage.
No cloud, no API calls, no data leaves your machine.
Your code never leaves your machine. All scanning happens locally against a pre-built vulnerability database. Air-gapped environments welcome.
Local LLM analysis via Ollama. The AI reads your actual source code, correlates with CVE data, and tells you exactly where you're exposed.
Python, Node.js, Go, Rust, Java, PHP, Ruby. VulnHunter parses lockfiles, manifests, and dependency trees across 7 ecosystems and 15+ file formats.
Generate SARIF 2.1.0 reports for GitHub Code Scanning integration and VS Code SARIF Viewer. Drop findings directly into your workflow.
API keys stored in your OS keyring, never in plaintext. No secrets in logs, no data exfiltration. Built by a cybersecurity professional.
Goes beyond direct deps. Integrates with pipdeptree, npm, mvn, composer, and go to scan the full dependency tree for hidden vulnerabilities.
Point VulnHunter at any project directory. It auto-detects lockfiles and manifests across all supported ecosystems.
Add --ai-triage to let a local LLM analyze each vulnerability against your actual codebase. It identifies which CVEs are actually exploitable in your context.
Export results in SARIF 2.1.0 format for GitHub Code Scanning or VS Code SARIF Viewer. Integrates directly into your CI/CD pipeline.
Download the pre-built database from GitHub Releases or build your own from OSV and NVD sources. Auto-updated weekly via GitHub Actions.
Manage settings, API keys, and AI preferences. NVD keys are stored securely in your OS keyring, never in plaintext config files.
Add VulnHunter to your GitHub Actions pipeline. Fail builds on critical vulnerabilities and upload SARIF to GitHub Security tab.
| Ecosystem | Files Detected | Transitive Deps |
|---|---|---|
| Python | requirements.txt Pipfile.lock poetry.lock uv.lock |
pipdeptree |
| Node.js | package-lock.json yarn.lock pnpm-lock.yaml |
npm ls |
| Go | go.sum go.mod |
go mod graph |
| Rust | Cargo.lock |
Built-in |
| Java | pom.xml build.gradle |
mvn dependency:tree |
| PHP | composer.lock |
composer show |
| Ruby | Gemfile.lock |
bundle list |
VulnHunter identifies vulnerable dependencies in your project.
The local LLM reads your source code and correlates it with CVE details.
Each vulnerability gets a contextual risk assessment: is it actually reachable in your code?
Focus on what matters. Stop wasting time on CVEs that don't affect you.
Basic triage. Low resource usage.
Best balance of speed and accuracy.
Deep analysis. Best results.
Use VulnHunter as a Python library to integrate vulnerability scanning into your own tools and workflows.
The analyze() function takes a database and a list of dependencies, returning a ScanResult with all matched vulnerabilities sorted by severity.
The TriageEngine sends each vulnerability to a local Ollama LLM along with code references found by CodeAnalyzer, returning contextual risk assessments.
Use render_xlsx() to generate styled Excel reports, or access the ScanResult model directly for custom integrations.