RAPTOR — Framework Architecture
Command Reference
| Command | Purpose |
|---|---|
/raptor |
Main security assistant — general queries |
/scan |
Static analysis with Semgrep/CodeQL + LLM validation |
/fuzz |
Binary fuzzing with AFL++ and crash analysis |
/agentic |
Full autonomous security workflow |
/exploit |
Proof-of-concept exploit generation |
/patch |
Automated security patch development |
/understand |
Adversarial code analysis |
/oss-forensics |
Evidence-backed GitHub repository investigations |
Tiered Architecture
RAPTOR uses a sophisticated loading system to manage context:
Bootstrap (Always Loaded):
CLAUDE.md— Core instructions and security mindset
Tier 1 (Auto-Loaded Contextually):
- Adversarial thinking frameworks
- Recovery strategies for failed analyses
- Security-first reasoning patterns
Tier 2 (Loaded on Request): Nine expert security personas modeled after renowned researchers:
- Mark Dowd (vulnerability analysis)
- Binary exploitation specialists
- Web application security experts
- Cryptography advisors
- And more...
Agents:
- Offensive security specialist with autonomous capabilities
- SecOpsAgentKit integration for penetration testing
Core Capabilities
Static Analysis (/scan)
- Runs Semgrep and CodeQL scans
- LLM-powered validation to reduce false positives
- Prioritizes findings:
Impact × Exploitability / Detection Time
Binary Fuzzing (/fuzz)
- AFL++ fuzzing with intelligent seed generation
- Automated crash analysis and triage
- Reproducible test case generation
Vulnerability Analysis
- Advanced reasoning to identify exploitable patterns
- Cross-reference with known vulnerability databases
- Severity scoring and prioritization
Exploit Generation (/exploit)
- Proof-of-concept code for confirmed vulnerabilities
- Responsible disclosure formatting
- Impact demonstration
Patch Development (/patch)
- Automated security fix generation
- Regression test creation
- Code review-ready patches
Security Note
RAPTOR is designed for authorized security testing, defensive security research, and educational purposes. Always ensure you have proper authorization before testing systems.
FAQ
Q: What is RAPTOR? A: An autonomous security research framework for Claude Code that performs static analysis, fuzzing, vulnerability discovery, exploit generation, and patch development using AI-powered analysis.
Q: Is RAPTOR free? A: Yes, MIT license. Some underlying tools (Semgrep, CodeQL) have their own licensing terms.
Q: Who created RAPTOR? A: Security researchers Gadi Evron, Daniel Cuthbert, Thomas Dullien (Halvar Flake), Michael Bargury, and John Cartwright.