NFGuard Documentation
Version 0.1.0 (Pre-Release) — February 17, 2026
This is an early pre-release version. NFGuard is functional but still evolving — you may encounter bugs or incomplete features. We are actively improving the tool with every update.
Found a bug? Have a suggestion? Please open an issue on GitHub — your feedback helps us build a better tool for the entire community.
This project is made with ❤️ for the cybersecurity community and enthusiasts worldwide.
Overview
NFGuard is an AI-powered security CLI that uses a multi-agent architecture to orchestrate 34+ security tools. You describe what you want in natural language, and the AI orchestrator delegates tasks to specialized agents (Recon, Web Testing, Vulnerability Scanning, Reporting), each with access to the right tools for the job.
All tools are bundled as pre-compiled binaries — no manual installation of individual tools required. NFGuard works with any OpenAI-compatible LLM provider, including local models.
Requirements
- Operating System: Linux x86_64 (amd64) — native Linux or WSL (Windows Subsystem for Linux)
- Root access: Required for installation (sudo)
- LLM Provider: Any OpenAI-compatible API endpoint (local or cloud)
- Disk space: ~650MB (bundled security binaries + Python runtime)
Installation
Quick Install (one command)
Copy and paste this into your terminal:
Then configure your provider and launch:
Manual Installation
If you prefer to download and inspect the script first:
What the installer does
- Downloads NFGuard v0.1.0 from GitHub Releases
- Extracts NFGuard to
/opt/nfguard/ - Creates a symlink at
/usr/local/bin/nfguard(available system-wide) - Creates a config directory at
~/.nfguard/with default configuration templates - Sets secure file permissions (600) on config files
First Run
On first launch, if you haven't configured a provider yet, NFGuard will run an interactive setup wizard that guides you through:
- Entering your provider's base URL
- Entering your API key
- Selecting a model from the available models
The wizard saves everything to ~/.nfguard/ automatically.
Configure a Provider
NFGuard works with any LLM provider that exposes an OpenAI-compatible API endpoint.
Configuration is done in ~/.nfguard/providers.yaml:
providers.yaml file contains your API keys and has restricted permissions (chmod 600).
Never share this file or commit it to version control.
Local LLM (Recommended)
NFGuard works great with local LLM servers that expose an OpenAI-compatible endpoint:
Ollama
LM Studio
Recommended local models
| Model | Notes |
|---|---|
| GPT-OSS 120B | Strong open-source model for tool-use and reasoning |
| Minimax M2.5 | Excellent performance for multi-step security workflows |
| Qwen 3.5 397B-A17B | MoE architecture — high capability with efficient inference |
| GLM-4.7-Flash | Fast and lightweight — good for machines with limited VRAM |
Cloud Providers
If you prefer cloud-based models, any OpenAI-compatible provider works.
Chutes.ai (Recommended)
We recommend Chutes.ai as a cloud provider. It offers a large catalog of open-weight models, decentralized infrastructure, and competitive pricing.
Browse available models at chutes.ai and use the model ID in your config (e.g., openai/gpt-oss-120b-TEE).
OpenRouter
Anthropic
OpenAI
Other Providers
Any service with an OpenAI-compatible /v1/chat/completions endpoint will work. Examples: Together AI, Groq, Fireworks AI, DeepInfra, etc.
Change the Model
In config file
Edit ~/.nfguard/config.yaml:
At runtime (in the REPL)
Config Files
All configuration is stored in ~/.nfguard/:
| File | Purpose |
|---|---|
config.yaml | General settings: default provider, model, log level |
providers.yaml | LLM provider credentials (API keys, base URLs) |
mcp.yaml | MCP server connections (optional) |
skills/ | Custom YAML skill definitions |
agents/specialists/ | Custom specialist agent configs |
Basic Usage
Start NFGuard
Natural language commands
Just describe what you want. The AI orchestrator will figure out which tools and agents to use:
Slash Commands
Quick commands available in the REPL:
| Command | Description |
|---|---|
/help | Show available commands |
/exit | Exit NFGuard |
/clear | Clear conversation history |
/compact | Manually compact context (summarize conversation) |
/export [format] [file] | Export conversation (markdown, json, html) |
/providers | List configured providers |
/provider <name> | Switch active provider |
/models | List available models |
/model <name> | Switch active model |
/tools | List available security tools |
/agents | List specialist agents |
/skills | List available skills/workflows |
/mcp | Show MCP server connections |
/context [tier|number] | Show or set context window size (64k/131k/200k/400k/1m) |
/settings | Configure tool API keys, default timeout, and max retries |
/damage-control on|off | Toggle bash guardrails |
/create-agents | Create a custom specialist agent |
Built-in Skills
Skills are pre-built workflows that chain multiple tools together with a single command:
/full-recon <target>
Run complete reconnaissance on a target:
/vuln-check <target>
Check a target for known vulnerabilities:
/web-audit <url>
Run a web application security audit:
Custom Skills
The AI can create new skills during a conversation and save them as YAML files in ~/.nfguard/skills/, making them immediately available as slash commands.
/settings — Configuration
The /settings command opens an interactive menu to configure:
- Tool API Keys — Set API keys for tools that require them (Shodan, ProjectDiscovery PDCP). Keys are stored securely in
~/.nfguard/tools/with restricted permissions (0600). - Default Tool Timeout — Set the maximum time a tool can run before being killed. Options: 30s, 60s, 120s (default), 300s.
- Max Tool Retries — Set how many times a failed tool is automatically retried. Options: 1x to 5x (default: 2x).
/context — Context Window
The /context command shows or sets the context window size used for conversation history management:
Available tiers: 64k, 131k, 200k, 400k, 1m. You can also pass a custom integer value.
Agent Delegation
The orchestrator automatically decides which specialist agent to use based on your request. You can also explicitly mention an agent:
| Agent | Focus | Tools |
|---|---|---|
| ReconAgent | Reconnaissance, DNS, OSINT | 18 tools |
| WebTestingAgent | Web app security testing | 12 tools |
| VulnScanningAgent | CVE scanning, severity analysis | 3 tools |
| ReportingAgent | PDF/DOCX report generation | 1 tool |
MCP Server Mode
NFGuard can run as a Model Context Protocol (MCP) server, exposing all 34+ security tools for use by any MCP-compatible client (e.g., Claude Desktop):
This starts a JSON-RPC server on stdin/stdout. Configure it in your MCP client as a local command server.
Session Export
Export your conversation and findings for documentation:
All Tools Reference
Use /tools in the REPL to see which tools are installed and ready. Full list:
| Tool | Category | Description |
|---|---|---|
subfinder | Recon | Passive subdomain discovery |
amass | Recon | Attack surface mapping (OWASP) |
theharvester | Recon | OSINT gathering (emails, hosts) |
shodan | Recon | Internet-wide device search |
uncover | Recon | Multi-engine search (Shodan, Censys...) |
alterx | Recon | Subdomain wordlist permutation |
asnmap | Recon | ASN to CIDR range mapping |
cdncheck | Recon | CDN/WAF/cloud detection |
subzy | Recon | Subdomain takeover detection |
whois | Recon | Domain registration lookup |
dnsx | DNS | Fast DNS resolution (all types) |
doggo | DNS | Modern DNS query with JSON |
naabu | Network | Fast port scanner |
tlsx | Network | TLS/SSL certificate scanner |
mapcidr | Network | CIDR range manipulation |
katana | Web | Web crawler (headless browser) |
gau | Web | Known URLs from archives |
waybackurls | Web | Historical URLs (Wayback Machine) |
unfurl | Web | URL component extraction |
anew | Utility | Line deduplication |
httpx | Web | HTTP probing & tech detection |
webfetch | Web | In-process HTTP client (SSRF-safe) |
gobuster | Fuzzing | Directory/file brute-forcing |
ffuf | Fuzzing | Fast web fuzzer |
feroxbuster | Fuzzing | Recursive content discovery |
nuclei | VulnScan | Template-based vulnerability scanner |
dalfox | VulnScan | XSS scanner |
crlfuzz | VulnScan | CRLF injection scanner |
sqlmap | VulnScan | SQL injection detection |
arjun | VulnScan | Hidden parameter discovery |
interactsh | VulnScan | Out-of-band interaction (blind vulns) |
reportgen | Reporting | PDF/DOCX report generator |
notify | Reporting | Slack/Discord/Telegram notifications |
Uninstall
To completely remove NFGuard from your system:
The uninstaller removes /opt/nfguard/ and the /usr/local/bin/nfguard symlink but preserves your ~/.nfguard/ configuration directory.
License
NFGuard is released under the MIT License. It is a community project — currently distributed as a compiled binary.
Use responsibly and only on systems you have explicit authorization to test. Unauthorized security testing is illegal in most jurisdictions.
Contact & Feedback
For questions, bug reports, or feature requests:
- GitHub Issues: github.com/dolutech/nfguard-cli/issues — report bugs, request features, suggest improvements
- Email: [email protected]
NFGuard is a community project made with ❤️ for cybersecurity professionals and enthusiasts. Every issue you open and every suggestion you share helps make this tool better for everyone.