Chatio
Chatio copied to clipboard
Chatio is An AI-powered assistant for hackers and security professionals built for Caido
An AI-powered assistant for hackers and security professionals built for Caido
Table of Contents
- Overview
- Features
- Installation
- Quick Start
- AI Provider Setup
- Usage
- Security Testing Workflows
- Quick Actions (Beta)
- Advanced Features
- Troubleshooting
- Documentation
- Updates
- Feedback & Issues
- License
Overview
Chatio is a comprehensive AI-powered security testing assistant that seamlessly integrates with Caido. Designed specifically for penetration testers, security researchers, and cybersecurity professionals, Chatio provides intelligent analysis, vulnerability assessment, and expert guidance across all aspects of security testing.
With support for multiple AI providers and specialized security-focused capabilities, Chatio transforms your Caido workflow into an intelligent security testing environment.
Features
Multi-Provider AI Support
- OpenAI Integration: GPT-4o, GPT-4-turbo, and GPT-3.5 models with vision capabilities
- Anthropic Claude: Claude 3.5 Sonnet, Claude 3 Haiku for advanced code analysis
- Google Gemini: Free tier available with Gemini Pro and Flash models
- DeepSeek: Cost-effective alternative with competitive performance
- Local LLMs: Complete privacy with Ollama integration (llama3.2, mistral, codellama)
- Dynamic Model Switching: Choose the best AI model for each specific task
Specialized Security Testing Assistance
- Vulnerability Analysis: Deep dive into OWASP Top 10, zero-days, and custom vulnerability research
- Secure Code Review: Multi-language source code security analysis with fix suggestions
- Network Penetration Testing: Complete methodologies from reconnaissance to post-exploitation
- Web Application Security: SQL injection, XSS, authentication bypass techniques
- Mobile & API Security: iOS/Android testing, REST/GraphQL API security assessment
- Cloud Security: AWS, Azure, GCP misconfigurations and attack vectors
- Social Engineering: Phishing campaigns, pretexting, and human psychology attacks
- Binary Exploitation: Buffer overflows, ROP chains, and memory corruption techniques
Advanced File & Image Analysis
- Vision-Powered Analysis: Upload screenshots, network diagrams, and visual evidence
- Code File Processing: Direct analysis of source code files (.py, .js, .php, .java, etc.)
- Multi-Format Support: JSON, XML, HTML, text files, and configuration files
- Drag & Drop Interface: Simple file attachment with visual preview
- Batch Processing: Analyze multiple files simultaneously
- Smart Content Recognition: Automatic handling of different file types
Intelligent Chat System
- Context-Aware Conversations: Maintains testing context across multiple exchanges
- Chat History Management: Persistent conversation storage with search capabilities
- Quick Prompt Templates: Pre-built templates for common security scenarios
- Export Capabilities: Save conversations and findings for reporting
- Multi-Chat Support: Organize different testing sessions separately
- Real-time Status: Live connection status and provider information
Quick Actions (Beta)
- Instant AI-Powered Automation: Press
⌘ Ctrl+Spaceanywhere in Caido for intelligent command execution - Request Manipulation: Modify HTTP methods, headers, and bodies with natural language
- Scope Management: Create testing scopes with complex patterns and exclusions
- Filter Creation: Generate HTTPQL filters for targeted request analysis
- File Operations: Create and manage hosted files for fuzzing and testing
- Search Integration: Quick access to HTTP history search with intelligent queries
- Context-Aware: Automatically detects current tab and request context
- Multi-Provider Support: Works with all configured AI providers for maximum flexibility
Professional Security Features
- Custom System Prompts: Tailor AI behavior for specific testing methodologies
- Tool Integration Guidance: Expert advice on Burp Suite, Metasploit, Nmap usage
- Attack Vector Libraries: Comprehensive payload databases and exploitation techniques
- Reconnaissance & OSINT: Information gathering and target profiling strategies
- Compliance & Reporting: Structured output for professional security assessments
- Automation Scripts: Generate custom testing scripts and workflows
Privacy & Security
- Local Storage: All data stored locally in your browser
- API Key Security: Encrypted storage of sensitive credentials
- No Data Logging: Conversations remain private and are not transmitted to third parties
- Offline Capability: Full functionality with local LLM providers
- Secure Configuration: Best practices for API key management and usage limits
Installation
- Open Caido
- Navigate to Settings > Plugins
- Click the Plugin Store tab
- Search for "Chatio"
- Click Install
Quick Start
First-Time Setup
-
Configure Your First AI Provider:
- For beginners: Start with Google Gemini (free tier) or Local LLMs
- For professionals: OpenAI GPT-4o or Claude 3.5 Sonnet
- Navigate to Settings tab and add your API key
-
Test Your Connection:
- Click "Test Connection" for your chosen provider
- Verify successful authentication
-
Start Your First Analysis:
- Switch to Chat tab
- Upload a code file or describe your testing scenario
- Ask specific security-related questions
-
Explore Advanced Features:
- Try file uploads for code review
- Upload screenshots for visual analysis
- Use quick prompt templates for common scenarios
AI Provider Setup
| Provider | Setup Steps | Cost | Best For |
|---|---|---|---|
| Google Gemini | Visit aistudio.google.com → API Keys → Create | Free tier available | Beginners, general testing |
| OpenAI | Visit platform.openai.com → API Keys → Create | ~$0.03/1K tokens (GPT-4) | Professional testing, vision |
| Anthropic | Visit console.anthropic.com → API Keys → Create | ~$0.025/1K tokens | Code analysis, complex reasoning |
| Local LLMs | Install Ollama → ollama pull llama3.2 |
Free | Privacy, offline testing |
| DeepSeek | Visit platform.deepseek.com → API Keys → Create | Cost-effective | Budget-conscious professionals |
Recommended Models by Use Case
| Use Case | Recommended Model | Provider |
|---|---|---|
| Code Security Review | Claude 3.5 Sonnet | Anthropic |
| Image Analysis | GPT-4o | OpenAI |
| General Security Questions | Gemini Pro | |
| Complex Exploitation | GPT-4-turbo | OpenAI |
| Privacy-Focused Testing | llama3.2, mistral | Local (Ollama) |
| Rapid Prototyping | GPT-3.5-turbo | OpenAI |
Usage
Basic Security Analysis
-
Ask Security Questions:
"Explain SQL injection techniques for MySQL databases" "How to bypass WAF protection in XSS attacks" "Generate a phishing email template for IT security testing" -
Upload Code for Review:
- Drag & drop source code files
- Get instant security vulnerability analysis
- Receive specific fix recommendations
-
Visual Evidence Analysis:
- Upload screenshots of applications
- Analyze network topology diagrams
- Get insights from error messages or logs
Advanced Security Testing
-
Structured Penetration Testing:
- Use quick prompt templates for different phases
- Maintain context across reconnaissance to post-exploitation
- Generate detailed methodology documentation
-
Multi-File Analysis:
- Upload entire codebases for comprehensive review
- Analyze configuration files for misconfigurations
- Process log files for security incidents
-
Custom Testing Scenarios:
- Set specialized system prompts for specific environments
- Integrate with Caido's intercept and modification features
- Generate custom payloads and test cases
Quick Actions (Beta)
⚡ Intelligent automation at your fingertips! Press Ctrl+Space anywhere in Caido to access AI-powered Quick Actions that streamline your testing workflow.
How It Works
- Activate: Press
Ctrl+Spacein any Caido tab - Describe: Use natural language to describe what you want to do
- Execute: AI understands context and performs the action instantly
Core Capabilities
| Category | Examples | What It Does |
|---|---|---|
| Request Editing | "change method to POST" |
Modifies HTTP methods, headers, body content |
| Scope Creation | "create scope for testfire.net domain" |
Generates testing scopes with allowlists/denylists |
| Filter Management | "create filter for API endpoints" |
Creates HTTPQL filters for request analysis |
| File Operations | "create wordlist with common usernames" |
Generates hosted files for fuzzing/testing |
| Search & Analysis | "search for login endpoints" |
Searches HTTP history with intelligent queries |
Quick Actions Examples
🎯 Scope Management:
"create scope for vulnbank.com but exclude admin.vulnbank.com"
"create scope for hackme[1-9].com pattern"
"create scope for *.pentest-lab.org wildcard"
🔧 Request Manipulation:
"replace GET with POST and add JSON header"
"change request body to include XSS payload"
"add authorization header with Bearer token"
🔍 Smart Filtering:
"create filter for API endpoints"
"filter requests with 4xx status codes"
"create filter to dismiss all CSS and JS files"
📁 File Creation:
"create wordlist file with common passwords"
"generate payload file with SQL injection vectors"
"create subdomain enumeration wordlist"
Getting Started with Quick Actions
- First Time: Open any request in Caido (Replay, Intercept, HTTP History)
- Activate: Press
Ctrl+Spaceto open Quick Actions - Try Examples: Start with simple commands like
"change method to POST" - Get Creative: Use natural language - AI understands context and intent
Beta Notice
Quick Actions is in active development. Current limitations:
- Scope update/delete functions are temporarily disabled
- Best performance with GPT-4o, Claude 3.5 Sonnet
- Some complex commands may require refinement
Security Testing Workflows
Common Attack Scenarios
| Attack Vector | Chatio Capabilities |
|---|---|
| Web Application Testing | OWASP Top 10 analysis, custom payload generation, bypass techniques |
| Network Penetration | Scanning methodologies, service enumeration, privilege escalation |
| API Security Assessment | REST/GraphQL testing, authentication flaws, rate limiting bypass |
| Mobile Application Testing | Static/dynamic analysis, runtime manipulation, platform-specific attacks |
| Cloud Security | Configuration review, IAM analysis, container security assessment |
| Social Engineering | Campaign design, psychological profiling, pretext development |
| Binary Exploitation | Reverse engineering, memory corruption, exploit development |
| Wireless Security | Protocol analysis, encryption attacks, infrastructure testing |
Professional Testing Methodologies
-
Reconnaissance Phase:
- OSINT gathering strategies
- Target profiling techniques
- Attack surface enumeration
-
Vulnerability Assessment:
- Automated scan result analysis
- Manual testing guidance
- False positive filtering
-
Exploitation Development:
- Custom payload creation
- Bypass technique development
- Proof-of-concept scripting
-
Post-Exploitation:
- Lateral movement strategies
- Persistence mechanisms
- Data exfiltration techniques
-
Reporting & Documentation:
- Structured finding reports
- Executive summary generation
- Remediation recommendations
Advanced Features
Context Management
- Intelligent Memory: Maintains conversation context across multiple exchanges
- Session Organization: Separate chats for different testing phases
- Context Optimization: Configurable message history for optimal performance
Custom System Prompts
Example: "You are a penetration testing expert specializing in web applications.
Focus on practical exploitation techniques and provide step-by-step methodologies."
File Processing Capabilities
- Supported Formats: Images (PNG, JPG), Code files (.py, .js, .php, etc.), Documents (TXT, JSON, XML)
- Vision Models: Automatic detection and use of image-capable models
- Batch Analysis: Process multiple files simultaneously
Integration Features
- Caido Workflow: Seamless integration with Caido's proxy and testing features
- Export Functions: Save conversations, findings, and methodologies
- Theme Support: Dark/light mode matching Caido's interface
Troubleshooting
Common Issues
API Key & Authentication Problems
- Invalid API Key: Verify key format and check for extra spaces
- Insufficient Quota: Add payment method in provider dashboard
- Rate Limiting: Switch to different model or wait for reset
- Network Issues: Check firewall/proxy settings, try different networks
File Upload & Image Analysis
- Image Analysis Failing: Ensure vision-capable model is selected
- File Size Limits: Reduce file size or split large files
- Unsupported Formats: Check supported file types in documentation
- Upload Errors: Try copy-paste for text content
Performance Optimization
- Slow Responses: Reduce context messages, use faster models
- High Costs: Monitor usage, set limits, use cheaper models for simple queries
- Connection Issues: Verify internet stability, restart Caido if needed
Local LLM Setup
-
Install Ollama:
# Download from https://ollama.ai ollama serve -
Download Models:
ollama pull llama3.2 # General purpose ollama pull llama3.2-vision # Image analysis ollama pull codellama # Code analysis -
Configure Chatio:
- Set URL:
http://localhost:11434 - Add models:
llama3.2, llama3.2-vision, codellama
- Set URL:
Documentation
Complete documentation including:
- Setup Guides: Step-by-step provider configuration
- Security Templates: Pre-built prompts for common scenarios
- Best Practices: Professional testing methodologies
- Troubleshooting: Comprehensive problem-solving guides
Access the full documentation within the plugin under the Help & Docs tab.
Updates
Chatio is actively maintained with regular updates including:
- New AI provider integrations
- Enhanced security testing templates
- Performance optimizations
Feedback & Issues
If you encounter any issues or have suggestions for improvements, please:
- Report bugs and feature requests
- Share your security testing workflows
- Contribute to the growing knowledge base
License
This project is licensed under the MIT License - see the LICENSE file for details.
Made with ❤️ by Amr Elsagaei for the Caido and security community