Getting Started
Quickstart
HTTP, OpenClaw, TUI, and upload/share flows.
Quickstart in 3 Steps
- Install the global CLI binary.
- Run either an HTTP scan or an OpenClaw local-path scan.
- Review local artifacts or the uploaded share link.
1) Install
curl -fsSL https://agentprey.com/install | shagentprey --helpagentprey scan --helpagentprey initIf your platform is not supported by the installer, use the Cargo fallback in Installation.
2) HTTP Scan
agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --json-out ./scan.json --html-out ./scan.html2b) Interactive Control Center
# terminal 1python3 scripts/mock_agent.py --mode vulnerable --port 8787# terminal 2agentprey center --target http://127.0.0.1:8787/chat --category prompt-injection3) Review Results
- Check the terminal summary for vulnerable, resistant, and error counts.
- Open
scan.htmlfor a human-readable report. - Use
scan.jsonfor CI parsing and automation. - If you used
--upload, the CLI printsscan_run_id,share_id, and optionalshare_url.
Detailed Walkthrough
1) Start a Local Mock Target
python3 scripts/mock_agent.py --mode vulnerable --port 87872) Inspect Available Vectors
agentprey vectors list --category prompt-injection3) Initialize Project Config + Auth Commands
agentprey initagentprey auth activate --key <KEY>agentprey auth statusagentprey auth refreshagentprey vectors sync --pro4) Run the HTTP Scanner
agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection5) Run an OpenClaw Local-Path Scan
agentprey scan --type openclaw --target ./path/to/openclaw-project6) Use TUI Mode
agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --ui tui7) Launch The Control Center
# terminal 1python3 scripts/mock_agent.py --mode vulnerable --port 8787# terminal 2agentprey center --target http://127.0.0.1:8787/chat --category prompt-injectionagentprey center is the interactive front door for operator-driven runs. It is separate from direct scan usage so CI/CD and piped workflows stay predictable.
8) Run From Config Defaults
agentprey scan --config .agentprey.toml9) Generate Output Artifacts
agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --json-out ./scan.jsonagentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --html-out ./scan.html10) Upload And Share
agentprey auth activate --key <KEY>agentprey vectors sync --proagentprey scan --type openclaw --target ./path/to/openclaw-project --uploadUpload runs after the local scan completes. If the backend is configured with APP_BASE_URL, the CLI prints a share URL that resolves to /reports/<share_id>.
11) Tune Resilience Controls
agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --retries 2 --retry-backoff-ms 250 --max-concurrent 2 --rate-limit-rps 1012) Try a Resistant Target
python3 scripts/mock_agent.py --mode resistant --port 8787agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injectionCalibration Sanity Check
Vulnerable mode should trigger findings. Resistant mode should stay near-zero false positives.
# vulnerable baselinepython3 scripts/mock_agent.py --mode vulnerable --port 8787agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection# resistant baselinepython3 scripts/mock_agent.py --mode resistant --port 8787agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injectionPro Activation
- Checkout from
/pricing. - Get your activation key from checkout success or email backup.
- Activate with
agentprey auth activate --key <KEY>. - Sync Pro vectors with
agentprey vectors sync --pro. - Run a Pro scan with the entitled vector bundle.
agentprey auth activate --key <KEY>agentprey vectors sync --proagentprey scan --type openclaw --target ./path/to/openclaw-project --uploadTroubleshooting
auth failed
Re-activate with the latest key, then refresh and verify local auth status.
agentprey auth activate --key <KEY>agentprey auth refreshagentprey auth statusno vectors found
Verify the vectors directory and sync Pro vectors if you are on the Pro tier.
agentprey vectors list --vectors-dir vectorsagentprey vectors sync --proconnection refused
Start or fix the target service, then rerun scan against the correct endpoint.
python3 scripts/mock_agent.py --mode vulnerable --port 8787agentprey scan --target http://127.0.0.1:8787/chat --category prompt-injection --html-out ./scan.htmlKey Recovery
- Visit agentprey.com/recover.
- Enter your checkout email.
- If the email matches an account, AgentPrey will attempt to send a replacement key.
agentprey auth activate --key <NEW_KEY>agentprey vectors sync --pro