Multi-agent attack chain framework. Define declarative attack chains that link audit and inject modules into multi-step exploitation paths, then validate and trace them.
Execute an attack chain against a target architecture. Default mode is dry-run (simulation only) which traces the success path without executing destructive steps. Use --no-dry-run for live execution against configured targets.
Copy
Ask AI
qai chain run [OPTIONS]
Option
Required
Description
--chain-file
Yes
Path to attack chain definition (YAML)
--dry-run / --no-dry-run
No
Trace path without executing destructive steps (default: --dry-run)
--output
No
Output file for execution result JSON
--verbose / -v
No
Verbose output
--targets
No
Path to chain-targets.yaml config file. Falls back to ~/.qai/chain-targets.yaml.
--inject-model
No
Override inject model from targets config
Copy
Ask AI
qai chain run --chain-file chain.yaml --dry-runqai chain run --chain-file chain.yaml --output trace.json -v
Generate detection rules from observed attack patterns. Produces Sigma or Wazuh rules that would detect the chain’s execution in a monitored environment.
Copy
Ask AI
qai chain detect [OPTIONS]
Option
Required
Description
--results-dir
Yes
Path to completed chain results
--format
No
Rule format: sigma or wazuh (default: sigma)
--output
No
Output directory for detection rules
Detection rule generation is not yet implemented. The command is defined but returns a stub.