Skip to content

Getting Started with CAI CLI

This guide will walk you through launching the CAI CLI for the first time and performing your first security assessment using the command-line interface.

Prerequisites

Before starting, ensure you have:

Step 1: Launch the CLI

Open your terminal and run:

cai

You should see the CAI banner and prompt:

          CCCCCCCCCCCCC      ++++++++   ++++++++      IIIIIIIIII
       CCC::::::::::::C  ++++++++++       ++++++++++  I::::::::I
     CC:::::::::::::::C ++++++++++         ++++++++++ I::::::::I
    C:::::CCCCCCCC::::C +++++++++    ++     +++++++++ II::::::II
   C:::::C       CCCCCC +++++++     +++++     +++++++   I::::I
  C:::::C                +++++     +++++++     +++++    I::::I
  C:::::C                ++++                   ++++    I::::I
  C:::::C                 ++                     ++     I::::I
  C:::::C                  +   +++++++++++++++   +      I::::I
  C:::::C                    +++++++++++++++++++        I::::I
  C:::::C                     +++++++++++++++++         I::::I
   C:::::C       CCCCCC        +++++++++++++++          I::::I
    C:::::CCCCCCCC::::C         +++++++++++++         II::::::II
     CC:::::::::::::::C           +++++++++           I::::::::I
       CCC::::::::::::C             +++++             I::::::::I
          CCCCCCCCCCCCC               ++              IIIIIIIIII

                      Cybersecurity AI (CAI), v0.6.0
                          Bug bounty-ready AI

CAI>

The navigation bar at the bottom displays important system information including your current model, agent, cost tracking, and session details.

Step 2: Configure Your API Key

If your ALIAS_API_KEY is not configured, you'll see an authentication error. Configure it using one of these methods:

Create a .env file in your working directory:

ALIAS_API_KEY=ak_live_1234567890abcdef
CAI_MODEL=alias1
CAI_AGENT_TYPE=redteam_agent
CAI_DEBUG=1
CAI_PRICE_LIMIT=10.0

Method 2: Environment Variables

Set it directly in your terminal:

export ALIAS_API_KEY="ak_live_1234567890abcdef"
cai

Method 3: Runtime Configuration

After launching CAI, use the /config command:

CAI> /config CAI_MODEL=alias1

To view all current configuration:

CAI> /config

Step 3: Select Your Model

CAI supports multiple AI models. For optimal performance and cost balance, we recommend alias1:

CAI> /model alias1

To see all available models:

CAI> /model-show
Model Provider Best For Cost
alias1 Alias Robotics Recommended - Balanced performance Medium
gpt-4o OpenAI Complex reasoning and multi-modal High
claude-3-5-sonnet-20241022 Anthropic Fast responses with good quality High
o1-mini OpenAI Reasoning tasks Medium

πŸ’‘ Tip: You can change models at any time without losing your conversation history.

Step 4: Choose Your Agent

CAI provides specialized agents for different security tasks. Here's how to choose:

Option 1: List All Available Agents

CAI> /agent list

This displays all agents with their descriptions and primary use cases.

Option 2: Use the Selection Agent

If you're unsure which agent to use, start with the selection_agent:

CAI> /agent selection_agent
CAI> I need to test a web application for SQL injection

The agent will recommend the best agent for your task.

Option 3: Choose Directly

If you know which agent you need:

CAI> /agent redteam_agent

Common Agents and When to Use Them

Agent Purpose When to Use
redteam_agent Offensive security testing Default for penetration testing
bug_bounter_agent Bug bounty hunting Finding high-value vulnerabilities in web apps
blueteam_agent Defensive security analysis Security posture assessment and hardening
one_tool_agent Single-tool execution Quick scans with specific tools
dfir_agent Digital forensics and incident response Log analysis and forensic investigation
reverse_engineering_agent Binary analysis Malware analysis, firmware reversing
network_security_analyzer_agent Network security assessment Network scanning and traffic analysis
wifi_security_agent WiFi security testing Wireless penetration testing
selection_agent Agent recommendation When unsure which agent to use

πŸ’‘ Pro Tip: Start with selection_agent if you're new to CAIβ€”it will guide you to the right agent for your task.

Step 5: Start Your First Interaction

Now you're ready to interact with CAI! Simply type your prompt and press Enter.

Example 1: Basic Network Reconnaissance

CAI> Scan 192.168.1.1 for open ports and services

The agent will: - Process your request - Select and execute appropriate tools (e.g., nmap) - Display results in real-time - Provide analysis and recommendations

Example 2: Web Application Testing

CAI> /agent bug_bounter_agent
CAI> Test https://example.com for common web vulnerabilities

The agent will: - Perform reconnaissance - Test for OWASP Top 10 vulnerabilities - Execute security tools - Provide detailed findings

Example 3: CTF Challenge

# Set up CTF environment
CAI> /config CTF_NAME=hackableii
CAI> /config CTF_CHALLENGE=web_challenge

# Start the challenge
CAI> Analyze this CTF challenge and find the flag

Understanding the Output

As the agent works, you'll see:

  1. Tool Execution: Messages showing which tools are being launched
  2. Tool Output: Real-time results from executed commands
  3. Agent Reasoning: The agent's thought process (if CAI_DEBUG=1)
  4. Final Analysis: Summary, findings, and recommendations
  5. Cost Tracking: Updated costs in the navigation bar

Step 6: Essential Commands

Here are the most important commands to know:

Getting Help

# General help
CAI> /help

# Help for specific command
CAI> /help agent

# Quick reference guide
CAI> /quickstart

Agent Management

# List all agents
CAI> /agent list

# Switch to a specific agent
CAI> /agent redteam_agent

# Get info about current agent
CAI> /agent info

Model Management

# View current model
CAI> /model

# Change model
CAI> /model gpt-4o

# List all available models
CAI> /model-show

Session Management

# Save current conversation
CAI> /save pentest_session.json

# Save as Markdown report
CAI> /save findings_report.md

# Load previous conversation
CAI> /load pentest_session.json

View History and Costs

# View conversation history
CAI> /history

# View last 20 messages
CAI> /history 20

# Check costs and token usage
CAI> /cost

Clear and Reset

# Clear terminal output (keeps history)
CAI> Ctrl+L

# Flush conversation history
CAI> /flush

# Exit CAI
CAI> /exit
# or press Ctrl+D

Step 7: Shell Command Execution

CAI allows you to execute shell commands directly:

Using /shell Command

CAI> /shell nmap -sV 192.168.1.1

Using $ Shortcut

CAI> $ whoami
CAI> $ ls -la
CAI> $ nmap -sV localhost

Interactive Tools

For interactive tools, the agent will handle them appropriately:

CAI> Run a comprehensive port scan on 192.168.1.0/24
# Agent will execute nmap with appropriate flags

Step 8: Working with Configuration

View Current Configuration

CAI> /config

This displays a panel with all environment variables and their current values.

Change Configuration at Runtime

# Set a specific variable (use the number from /config output)
CAI> /config set 18 "5.0"

# Or set by name
CAI> /config CAI_PRICE_LIMIT=5.0
CAI> /config CAI_MAX_TURNS=50

Important Configuration Variables

Variable Description Example
CAI_MODEL Default model to use alias1
CAI_AGENT_TYPE Default agent redteam_agent
CAI_DEBUG Debug level (0-2) 1
CAI_PRICE_LIMIT Maximum cost in USD 10.0
CAI_MAX_TURNS Maximum conversation turns 50
CAI_MAX_INTERACTIONS Maximum tool interactions 100
CAI_TRACING Enable OpenTelemetry tracing true
CAI_GUARDRAILS Enable security guardrails true

See the complete Configuration Guide for all options.

Step 9: Common Workflows

Workflow 1: Quick Security Scan

# Launch with specific agent
CAI_AGENT_TYPE=redteam_agent cai

# Execute scan
CAI> Perform a quick security assessment of 192.168.1.100

# Save results
CAI> /save quick_scan_results.md

Workflow 2: Bug Bounty Reconnaissance

# Start with bug bounty agent
CAI> /agent bug_bounter_agent

# Reconnaissance
CAI> Perform full reconnaissance on target.com

# Test specific vulnerability
CAI> Test the login form for SQL injection

# Generate report
CAI> Generate a detailed bug bounty report

# Save session
CAI> /save bugbounty_target_session.json

Workflow 3: CTF Challenge

# Configure CTF environment
export CTF_NAME="hackableii"
export CTF_CHALLENGE="web_app"
export CAI_AGENT_TYPE="redteam_agent"

# Launch and solve
cai

CAI> Analyze this CTF challenge and find the flag

Workflow 4: Network Analysis

CAI> /agent network_security_analyzer_agent

# Analyze network
CAI> Scan the network 192.168.1.0/24 for security issues

# Analyze captured traffic
CAI> Analyze this PCAP file for suspicious activity

# View findings
CAI> /history

Step 10: Keyboard Shortcuts

Master these shortcuts for faster navigation:

Shortcut Action
Tab Autocomplete commands and arguments
↑ / ↓ Navigate through command history
Ctrl+C Interrupt current execution
Ctrl+L Clear terminal screen
Ctrl+Z Suspend process (resume with fg)
Ctrl+U Clear current input line
Ctrl+A Move cursor to start of line
Ctrl+E Move cursor to end of line

Common First-Time Issues

Issue: API Key Not Valid

Solution:

# Check your API key is set correctly
CAI> /env | grep ALIAS_API_KEY

# If not set, add it to .env file
echo "ALIAS_API_KEY=your_key_here" >> .env

Issue: Agent Not Responding

Solution:

# Cancel current operation
Ctrl+C

# Check agent is loaded
CAI> /agent

# Switch to a different agent
CAI> /agent redteam_agent

Issue: Command Not Found

Solution:

# Get help for available commands
CAI> /help

# Use Tab completion to see available commands
CAI> /<Tab>

# Check command syntax
CAI> /help <command_name>

Issue: Price Limit Reached

Solution:

# Check current costs
CAI> /cost

# Increase limit
CAI> /config CAI_PRICE_LIMIT=20.0

# Or set it before launching
CAI_PRICE_LIMIT=20.0 cai

Issue: Max Turns Exceeded

Solution:

# Increase turn limit
CAI> /config CAI_MAX_TURNS=100

# Or flush history and start fresh
CAI> /flush

Next Steps

Congratulations! You've completed the basics of CAI CLI. Here's what to explore next:

Learn More Commands

Explore Advanced Features

  • Queue System: Batch process multiple prompts
  • Parallel Execution: Run multiple agents simultaneously
  • Memory Management: Persistent context across sessions
  • MCP Integration: Connect external tools and services

Specialized Workflows

  • CTF Challenges: Learn CTF-specific workflows
  • Bug Bounty: Master bug bounty hunting techniques
  • Automation: Script security assessments
  • CI/CD Integration: Integrate CAI into your pipeline

Get Help

Quick Reference Card

Most Used Commands

/agent list              # List all agents
/agent <name>            # Switch agent
/model <name>            # Change model
/config                  # View configuration
/help                    # Get help
/save <file>             # Save session
/load <file>             # Load session
/cost                    # Show costs
/history                 # View history
/shell <cmd>             # Run shell command
$ <cmd>                  # Shell shortcut
/exit                    # Exit CAI

Essential Workflows

# Quick scan
cai --prompt "scan target.com for vulnerabilities"

# CTF mode
CTF_NAME="challenge" cai

# Bug bounty
CAI_AGENT_TYPE=bug_bounter_agent cai

# With initial setup
CAI_MODEL=alias1 CAI_PRICE_LIMIT=10 cai

Last updated: November 2025 | CAI CLI v0.6+