BACK_TO_FEEDAICRIER_2
AIDA 1.1 ships auth, lighter pentest stack
OPEN_SOURCE ↗
REDDIT · REDDIT// 3h agoOPENSOURCE RELEASE

AIDA 1.1 ships auth, lighter pentest stack

AIDA, an open-source MCP-based autonomous pentesting platform, has released v1.1.0 with JWT auth, PDF reporting, a lighter built-in `aida-pentest` container, and new engagement tools like `python_exec` and `http_request`. The release pushes the project beyond a raw demo into something closer to an operable local security workflow.

// ANALYSIS

The interesting part here is not just "LLM does pentesting" but that AIDA is closing the gap between agent demos and a usable security workbench. Swapping Exegol dependency for a built-in 2 GB container is the kind of practical product move that matters more than flashy autonomy claims.

  • The built-in container removes a major setup barrier, while still leaving Exegol as an optional heavier path for broader tool coverage
  • JWT auth, roles, first-run setup, and the Docker/socket hardening changes show the maintainer is reacting to real operator concerns, not just adding more agent tricks
  • `python_exec` gives the agent an escape hatch for edge-case payloads and workflow glue that fixed-tool wrappers usually miss
  • `http_request` plus credential placeholders makes the system more viable for authenticated web testing, which is where many autonomous security demos fall apart
  • The repo positions AIDA as model-agnostic and MCP-native, which makes it more interesting as infrastructure for security agents than as a single-purpose app
// TAGS
aidaagentmcpllmopen-sourceself-hostedautomation

DISCOVERED

3h ago

2026-04-23

PUBLISHED

5h ago

2026-04-23

RELEVANCE

8/ 10

AUTHOR

Justachillguypeace