1. Introduction to AiPy#
AiPy is an open-source project under the Starlink program of Zhidao Chuangyu 404 Laboratory. AiPy enables large models to write programs to operate computers, databases, browsers, and all applications, creating an intelligent system with autonomous development, execution, and feedback loops.
2. AiPy Windows System Installation#
Visit the AiPy official website https://www.aipy.app/ and directly select to run Windows with one-click extraction. The directory structure is as follows:
Create a configuration file aipy.toml
:
[llm.trustoken]
api_key = "your key"
base_url = "https://api.trustoken.ai/v1/"
model = "auto"
max_tokens = 16384
enable = true
default = true
Regarding the key
, you can use the interfaces from various platforms or the locally deployed large model interface, depending on your needs. Of course, third-party services also require payment. After configuration, double-click run.bat
to start.
3. AiPy Operating Google Chrome#
Give AiPy a prompt to start Google Chrome. When execution fails, it will identify the reason and modify the code to successfully launch Google Chrome. When instructed to fetch a photo from the Red Bull official website every 2 minutes, it executes successfully.
4. Can AiPy Conduct Vulnerability Mining?#
Start Google Chrome, crawl the subdomain interfaces of http://vulnweb.com/ and save them to the d.txt
file. Based on the interface paths, determine if they are vulnerable; if they are, construct harmless payloads to check for XSS vulnerabilities. Other vulnerabilities are not checked. After obtaining the subdomains, it is not specified what methods or means to use to acquire them. Let AiPy figure it out.
This is about the end; it's just a demonstration. After all, the prompts need to be well-constructed to potentially uncover vulnerabilities.