Security Services
Security tools for identity management, secrets storage, intrusion prevention, and security testing.Available Services
Authentik
Port: 9015 (HTTP), 9443 (HTTPS) | Memory: 2048 MB | Maturity: StableThe open-source Identity Provider that unifies your identity infrastructure.Features:
- SSO (Single Sign-On)
- SAML, OIDC, OAuth2
- LDAP provider
- Multi-factor authentication
- User provisioning
- Policy engine
Vaultwarden
Port: 8843 | Memory: 128 MB | Maturity: StableUnofficial Bitwarden compatible server written in Rust, perfect for self-hosted password management.Features:
- Bitwarden compatible
- Password management
- Secure notes
- TOTP generator
- Browser extensions
- Mobile apps
CrowdSec
Port: 8186 | Memory: 256 MB | Maturity: StableFree, open-source and collaborative IPS designed to protect servers, services, and containers.Features:
- Intrusion prevention
- Collaborative threat intelligence
- Scenario-based detection
- Bouncer integrations
- Log analysis
- Community blocklists
HexStrike AI
Port: 8888 | Memory: 2048 MB | Maturity: ExperimentalAI-Powered MCP Cybersecurity Automation Platform with 150+ pentesting tools.Features:
- 150+ pentesting tools
- MCP (Model Context Protocol) server
- Automated security testing
- Vulnerability scanning
- AI-powered analysis
- OpenClaw integration
- Skill:
hexstrike-mcp
PentAGI
Port: 8089 | Memory: 4096 MB | Maturity: ExperimentalFully autonomous AI Agents system capable of performing complex penetration testing tasks.Features:
- Autonomous pentesting
- Multi-agent system
- Automated exploitation
- Report generation
- AI-powered reconnaissance
- Vulnerability assessment
- Skill:
pentagi-orchestrator
PentestAgent
Port: 8090 | Memory: 2048 MB | Maturity: ExperimentalAI-powered penetration testing agent for automated security assessments.Features:
- Automated pentesting
- Network scanning
- Vulnerability detection
- Exploitation framework
- Reporting tools
- AI-assisted analysis
SolidityGuard
Port: 8091 | Memory: 1024 MB | Maturity: ExperimentalAI-powered smart contract security analyzer for detecting vulnerabilities in Solidity code.Features:
- Smart contract analysis
- Vulnerability detection
- Gas optimization
- Best practices checking
- Automated auditing
- Report generation
Usage Examples
Identity & Access Management
Security Monitoring
Penetration Testing Suite
Smart Contract Security
Security Categories
Identity & Access Management
- Authentik: Enterprise SSO and identity provider
- Vaultwarden: Password management and secrets storage
Intrusion Prevention
- CrowdSec: Collaborative IPS with threat intelligence
Penetration Testing
- HexStrike AI: MCP-based pentesting platform (150+ tools)
- PentAGI: Autonomous AI pentesting agents
- PentestAgent: AI-powered security assessments
Smart Contract Security
- SolidityGuard: Solidity vulnerability scanner
Service Comparison
| Service | Category | AI-Powered | Memory | Maturity |
|---|---|---|---|---|
| Authentik | IAM | ❌ | 2048 MB | Stable |
| Vaultwarden | Secrets | ❌ | 128 MB | Stable |
| CrowdSec | IPS | ❌ | 256 MB | Stable |
| HexStrike | Pentesting | ✅ | 2048 MB | Experimental |
| PentAGI | Pentesting | ✅ | 4096 MB | Experimental |
| PentestAgent | Pentesting | ✅ | 2048 MB | Experimental |
| SolidityGuard | Smart Contracts | ✅ | 1024 MB | Experimental |
Authentik Configuration
Initial Setup
- Access web UI at
http://localhost:9015 - Complete initial setup wizard
- Configure authentication flow
- Add applications
- Create user groups
- Set up providers (SAML/OIDC)
SSO Integration
Multi-Factor Authentication
- TOTP (Time-based One-Time Password)
- WebAuthn (hardware keys)
- SMS (with external provider)
- Email verification
- Push notifications
Vaultwarden Configuration
Admin Panel
Access admin panel:http://localhost:8843/admin
User Registration
HTTPS Setup (Required for Browser Extensions)
CrowdSec Configuration
Install Collections
Add Bouncers
View Decisions
Penetration Testing with HexStrike
MCP Integration
HexStrike runs as an MCP server that OpenClaw can connect to:Available Tool Categories
- Network scanning (nmap, masscan)
- Web application testing (sqlmap, xsstrike)
- Password cracking (hashcat, john)
- Exploitation frameworks (metasploit)
- Reconnaissance (theHarvester, recon-ng)
- Wireless testing (aircrack-ng)
Safety Considerations
⚠️ WARNING: Only use on systems you own or have explicit permission to test.PentAGI Autonomous Testing
Agent Workflow
- Reconnaissance: Gather information about target
- Scanning: Identify open ports and services
- Enumeration: Discover vulnerabilities
- Exploitation: Attempt to exploit findings
- Reporting: Generate detailed security report
Configuration
SolidityGuard Smart Contract Analysis
Supported Checks
- Reentrancy vulnerabilities
- Integer overflow/underflow
- Access control issues
- Gas optimization
- Unchecked external calls
- Front-running risks
Usage
Best Practices
Identity & Access Management
- MFA: Always enable multi-factor authentication
- Strong Passwords: Enforce password complexity
- Regular Audits: Review access logs regularly
- Least Privilege: Grant minimal necessary permissions
- Session Management: Configure appropriate session timeouts
Password Management
- HTTPS: Always use HTTPS for Vaultwarden
- Backups: Regular backups of password database
- Master Password: Use strong master password
- 2FA: Enable two-factor authentication
- Organization: Use folders and collections
Intrusion Prevention
- Regular Updates: Keep CrowdSec scenarios updated
- Log Collection: Ensure all services send logs
- Bouncer Deployment: Deploy bouncers on all entry points
- Alert Response: Define incident response procedures
- Whitelisting: Maintain whitelist of trusted IPs
Penetration Testing
- Authorization: Only test authorized systems
- Documentation: Document all testing activities
- Scope: Clearly define testing scope
- Backup: Ensure backups exist before testing
- Reporting: Generate detailed findings reports
Security Hardening
Network Security
Application Security
Container Security
Compliance
GDPR Compliance
- Data encryption at rest and in transit
- User data export capabilities
- Right to deletion
- Audit logging
- Data processing agreements
SOC 2 Considerations
- Access control and authentication
- Encryption standards
- Monitoring and alerting
- Incident response procedures
- Regular security assessments