Use Cases
From red teams to researchers—WAR-EYE adapts to your mission.
Red Team Ops
Internal Security Teams → Autonomous adversarial testing
Augment your red team with tireless, autonomous API assault. WAR-EYE runs 24/7, finding vulnerabilities your manual testers might miss.
- ▸ Continuous attack simulation against production APIs
- ▸ Pre-engagement reconnaissance automation
- ▸ Vulnerability discovery for pentest reports
- ▸ Training exercises with real-world attack patterns
$ wareye campaign start \
--target internal-api.corp.local \
--mode stealth \
--duration 72h
[REDTEAM] Stealth mode active
├─ Rate limiting: adaptive
├─ Fingerprint: randomized
└─ Logging: minimal
Campaign running... AppSec CI/CD
SecOps / DevSecOps → Campaigns run on every PR
Shift-left security at scale. Integrate WAR-EYE into your pipeline and catch API vulnerabilities before they hit production.
- ▸ Automated fuzzing on pull requests
- ▸ Baseline security checks in staging
- ▸ Regression testing for known vulnerabilities
- ▸ Security gates for deployment approval
# .github/workflows/security.yml
name: API Security
on: [pull_request]
jobs:
wareye:
runs-on: ubuntu-latest
steps:
- uses: wareye/action@v1
with:
target: ${{ env.API_URL }}
fail_on: critical MSSP Consulting
Security Consultancies → Drop-in recon + fuzzer for engagements
Elevate your service offering with industrial-grade API security testing. Impress clients with comprehensive, automated assessments.
- ▸ Rapid client API assessments
- ▸ White-label security reports
- ▸ Scalable multi-tenant testing
- ▸ Competitive differentiation
$ wareye report \
--campaign wry-client-abc \
--format pdf \
--branding custom
[REPORT] Generating...
├─ Findings: 12
├─ Critical: 2
├─ High: 4
└─ PoCs included
✓ Report exported Fuzz Labs
Security Researchers → Advanced campaign control & replay harnesses
For the hackers who push boundaries. Full control over fuzzing campaigns, corpus management, and harness generation.
- ▸ Custom corpus development
- ▸ Zero-day research campaigns
- ▸ Crash minimization and analysis
- ▸ Academic security research
$ wareye corpus manage \
--minimize \
--coverage-map ./cov.bin
[CORPUS] Analyzing...
├─ Inputs: 50,000 → 847
├─ Unique edges: 12,456
└─ Minimized: 98.3%
$ wareye harness export \
--crash CRASH-001 \
--format standalone Choose Your Deployment
| Use Case | Deployment | Integration | Recommended Plan |
|---|---|---|---|
| Red Team Ops | On-prem / Air-gapped | Standalone CLI | Team |
| AppSec CI/CD | Cloud / Container | GitHub Actions | Team |
| MSSP Consulting | Multi-tenant | MCP API | Enterprise |
| Fuzz Labs | Bare metal | SDK / CLI | Starter |