Getting Started with CAI CLI
This guide will walk you through launching the CAI CLI for the first time and performing your first security assessment using the command-line interface.
Prerequisites
Before starting, ensure you have:
- β CAI installed (see Installation Guide)
- β Python 3.9+ installed
- β
A valid
ALIAS_API_KEYfrom Alias Robotics
Step 1: Launch the CLI
Open your terminal and run:
cai
You should see the CAI banner and prompt:
CCCCCCCCCCCCC ++++++++ ++++++++ IIIIIIIIII
CCC::::::::::::C ++++++++++ ++++++++++ I::::::::I
CC:::::::::::::::C ++++++++++ ++++++++++ I::::::::I
C:::::CCCCCCCC::::C +++++++++ ++ +++++++++ II::::::II
C:::::C CCCCCC +++++++ +++++ +++++++ I::::I
C:::::C +++++ +++++++ +++++ I::::I
C:::::C ++++ ++++ I::::I
C:::::C ++ ++ I::::I
C:::::C + +++++++++++++++ + I::::I
C:::::C +++++++++++++++++++ I::::I
C:::::C +++++++++++++++++ I::::I
C:::::C CCCCCC +++++++++++++++ I::::I
C:::::CCCCCCCC::::C +++++++++++++ II::::::II
CC:::::::::::::::C +++++++++ I::::::::I
CCC::::::::::::C +++++ I::::::::I
CCCCCCCCCCCCC ++ IIIIIIIIII
Cybersecurity AI (CAI), v0.6.0
Bug bounty-ready AI
CAI>
The navigation bar at the bottom displays important system information including your current model, agent, cost tracking, and session details.
Step 2: Configure Your API Key
If your ALIAS_API_KEY is not configured, you'll see an authentication error. Configure it using one of these methods:
Method 1: Using a .env file (Recommended)
Create a .env file in your working directory:
ALIAS_API_KEY=ak_live_1234567890abcdef
CAI_MODEL=alias1
CAI_AGENT_TYPE=redteam_agent
CAI_DEBUG=1
CAI_PRICE_LIMIT=10.0
Method 2: Environment Variables
Set it directly in your terminal:
export ALIAS_API_KEY="ak_live_1234567890abcdef"
cai
Method 3: Runtime Configuration
After launching CAI, use the /config command:
CAI> /config CAI_MODEL=alias1
To view all current configuration:
CAI> /config
Step 3: Select Your Model
CAI supports multiple AI models. For optimal performance and cost balance, we recommend alias1:
CAI> /model alias1
To see all available models:
CAI> /model-show
Recommended Models
| Model | Provider | Best For | Cost |
|---|---|---|---|
alias1 |
Alias Robotics | Recommended - Balanced performance | Medium |
gpt-4o |
OpenAI | Complex reasoning and multi-modal | High |
claude-3-5-sonnet-20241022 |
Anthropic | Fast responses with good quality | High |
o1-mini |
OpenAI | Reasoning tasks | Medium |
π‘ Tip: You can change models at any time without losing your conversation history.
Step 4: Choose Your Agent
CAI provides specialized agents for different security tasks. Here's how to choose:
Option 1: List All Available Agents
CAI> /agent list
This displays all agents with their descriptions and primary use cases.
Option 2: Use the Selection Agent
If you're unsure which agent to use, start with the selection_agent:
CAI> /agent selection_agent
CAI> I need to test a web application for SQL injection
The agent will recommend the best agent for your task.
Option 3: Choose Directly
If you know which agent you need:
CAI> /agent redteam_agent
Common Agents and When to Use Them
| Agent | Purpose | When to Use |
|---|---|---|
redteam_agent |
Offensive security testing | Default for penetration testing |
bug_bounter_agent |
Bug bounty hunting | Finding high-value vulnerabilities in web apps |
blueteam_agent |
Defensive security analysis | Security posture assessment and hardening |
one_tool_agent |
Single-tool execution | Quick scans with specific tools |
dfir_agent |
Digital forensics and incident response | Log analysis and forensic investigation |
reverse_engineering_agent |
Binary analysis | Malware analysis, firmware reversing |
network_security_analyzer_agent |
Network security assessment | Network scanning and traffic analysis |
wifi_security_agent |
WiFi security testing | Wireless penetration testing |
selection_agent |
Agent recommendation | When unsure which agent to use |
π‘ Pro Tip: Start with
selection_agentif you're new to CAIβit will guide you to the right agent for your task.
Step 5: Start Your First Interaction
Now you're ready to interact with CAI! Simply type your prompt and press Enter.
Example 1: Basic Network Reconnaissance
CAI> Scan 192.168.1.1 for open ports and services
The agent will: - Process your request - Select and execute appropriate tools (e.g., nmap) - Display results in real-time - Provide analysis and recommendations
Example 2: Web Application Testing
CAI> /agent bug_bounter_agent
CAI> Test https://example.com for common web vulnerabilities
The agent will: - Perform reconnaissance - Test for OWASP Top 10 vulnerabilities - Execute security tools - Provide detailed findings
Example 3: CTF Challenge
# Set up CTF environment
CAI> /config CTF_NAME=hackableii
CAI> /config CTF_CHALLENGE=web_challenge
# Start the challenge
CAI> Analyze this CTF challenge and find the flag
Understanding the Output
As the agent works, you'll see:
- Tool Execution: Messages showing which tools are being launched
- Tool Output: Real-time results from executed commands
- Agent Reasoning: The agent's thought process (if
CAI_DEBUG=1) - Final Analysis: Summary, findings, and recommendations
- Cost Tracking: Updated costs in the navigation bar
Step 6: Essential Commands
Here are the most important commands to know:
Getting Help
# General help
CAI> /help
# Help for specific command
CAI> /help agent
# Quick reference guide
CAI> /quickstart
Agent Management
# List all agents
CAI> /agent list
# Switch to a specific agent
CAI> /agent redteam_agent
# Get info about current agent
CAI> /agent info
Model Management
# View current model
CAI> /model
# Change model
CAI> /model gpt-4o
# List all available models
CAI> /model-show
Session Management
# Save current conversation
CAI> /save pentest_session.json
# Save as Markdown report
CAI> /save findings_report.md
# Load previous conversation
CAI> /load pentest_session.json
View History and Costs
# View conversation history
CAI> /history
# View last 20 messages
CAI> /history 20
# Check costs and token usage
CAI> /cost
Clear and Reset
# Clear terminal output (keeps history)
CAI> Ctrl+L
# Flush conversation history
CAI> /flush
# Exit CAI
CAI> /exit
# or press Ctrl+D
Step 7: Shell Command Execution
CAI allows you to execute shell commands directly:
Using /shell Command
CAI> /shell nmap -sV 192.168.1.1
Using $ Shortcut
CAI> $ whoami
CAI> $ ls -la
CAI> $ nmap -sV localhost
Interactive Tools
For interactive tools, the agent will handle them appropriately:
CAI> Run a comprehensive port scan on 192.168.1.0/24
# Agent will execute nmap with appropriate flags
Step 8: Working with Configuration
View Current Configuration
CAI> /config
This displays a panel with all environment variables and their current values.
Change Configuration at Runtime
# Set a specific variable (use the number from /config output)
CAI> /config set 18 "5.0"
# Or set by name
CAI> /config CAI_PRICE_LIMIT=5.0
CAI> /config CAI_MAX_TURNS=50
Important Configuration Variables
| Variable | Description | Example |
|---|---|---|
CAI_MODEL |
Default model to use | alias1 |
CAI_AGENT_TYPE |
Default agent | redteam_agent |
CAI_DEBUG |
Debug level (0-2) | 1 |
CAI_PRICE_LIMIT |
Maximum cost in USD | 10.0 |
CAI_MAX_TURNS |
Maximum conversation turns | 50 |
CAI_MAX_INTERACTIONS |
Maximum tool interactions | 100 |
CAI_TRACING |
Enable OpenTelemetry tracing | true |
CAI_GUARDRAILS |
Enable security guardrails | true |
See the complete Configuration Guide for all options.
Step 9: Common Workflows
Workflow 1: Quick Security Scan
# Launch with specific agent
CAI_AGENT_TYPE=redteam_agent cai
# Execute scan
CAI> Perform a quick security assessment of 192.168.1.100
# Save results
CAI> /save quick_scan_results.md
Workflow 2: Bug Bounty Reconnaissance
# Start with bug bounty agent
CAI> /agent bug_bounter_agent
# Reconnaissance
CAI> Perform full reconnaissance on target.com
# Test specific vulnerability
CAI> Test the login form for SQL injection
# Generate report
CAI> Generate a detailed bug bounty report
# Save session
CAI> /save bugbounty_target_session.json
Workflow 3: CTF Challenge
# Configure CTF environment
export CTF_NAME="hackableii"
export CTF_CHALLENGE="web_app"
export CAI_AGENT_TYPE="redteam_agent"
# Launch and solve
cai
CAI> Analyze this CTF challenge and find the flag
Workflow 4: Network Analysis
CAI> /agent network_security_analyzer_agent
# Analyze network
CAI> Scan the network 192.168.1.0/24 for security issues
# Analyze captured traffic
CAI> Analyze this PCAP file for suspicious activity
# View findings
CAI> /history
Step 10: Keyboard Shortcuts
Master these shortcuts for faster navigation:
| Shortcut | Action |
|---|---|
Tab |
Autocomplete commands and arguments |
β / β |
Navigate through command history |
Ctrl+C |
Interrupt current execution |
Ctrl+L |
Clear terminal screen |
Ctrl+Z |
Suspend process (resume with fg) |
Ctrl+U |
Clear current input line |
Ctrl+A |
Move cursor to start of line |
Ctrl+E |
Move cursor to end of line |
Common First-Time Issues
Issue: API Key Not Valid
Solution:
# Check your API key is set correctly
CAI> /env | grep ALIAS_API_KEY
# If not set, add it to .env file
echo "ALIAS_API_KEY=your_key_here" >> .env
Issue: Agent Not Responding
Solution:
# Cancel current operation
Ctrl+C
# Check agent is loaded
CAI> /agent
# Switch to a different agent
CAI> /agent redteam_agent
Issue: Command Not Found
Solution:
# Get help for available commands
CAI> /help
# Use Tab completion to see available commands
CAI> /<Tab>
# Check command syntax
CAI> /help <command_name>
Issue: Price Limit Reached
Solution:
# Check current costs
CAI> /cost
# Increase limit
CAI> /config CAI_PRICE_LIMIT=20.0
# Or set it before launching
CAI_PRICE_LIMIT=20.0 cai
Issue: Max Turns Exceeded
Solution:
# Increase turn limit
CAI> /config CAI_MAX_TURNS=100
# Or flush history and start fresh
CAI> /flush
Next Steps
Congratulations! You've completed the basics of CAI CLI. Here's what to explore next:
Learn More Commands
- π Commands Reference - Complete command documentation
- π Advanced Usage - Automation, scripting, and advanced features
Explore Advanced Features
- Queue System: Batch process multiple prompts
- Parallel Execution: Run multiple agents simultaneously
- Memory Management: Persistent context across sessions
- MCP Integration: Connect external tools and services
Specialized Workflows
- CTF Challenges: Learn CTF-specific workflows
- Bug Bounty: Master bug bounty hunting techniques
- Automation: Script security assessments
- CI/CD Integration: Integrate CAI into your pipeline
Get Help
- β FAQ - Common questions
- π¬ Discord - Community support
- π GitHub Issues - Report bugs
Quick Reference Card
Most Used Commands
/agent list # List all agents
/agent <name> # Switch agent
/model <name> # Change model
/config # View configuration
/help # Get help
/save <file> # Save session
/load <file> # Load session
/cost # Show costs
/history # View history
/shell <cmd> # Run shell command
$ <cmd> # Shell shortcut
/exit # Exit CAI
Essential Workflows
# Quick scan
cai --prompt "scan target.com for vulnerabilities"
# CTF mode
CTF_NAME="challenge" cai
# Bug bounty
CAI_AGENT_TYPE=bug_bounter_agent cai
# With initial setup
CAI_MODEL=alias1 CAI_PRICE_LIMIT=10 cai
Last updated: November 2025 | CAI CLI v0.6+