audn-vuln-monitor
Audn Vulnerability Monitor
View and triage vulnerabilities detected by Audn.ai security campaigns.
Authentication
Bearer token via AUDN_API_TOKEN env var. Base URL: https://audn.ai.
All requests include header: Authorization: Bearer $AUDN_API_TOKEN.
Workflow
List Vulnerabilities
GET /api/vulnerabilities
Returns an array of findings with: id, title, severity (critical/high/medium/low/info), status (open/in_progress/resolved/suppressed), category, description, detected_at, recommendations.
More from audn-ai/skills
audn-red
Run a full adversarial red-team security audit against any AI agent (text or voice). Registers the agent, selects attack scenarios, executes a campaign, monitors progress, retrieves results, and generates a vulnerability report. Use when the user wants to security-test, red-team, pen-test, or audit an LLM or voice agent.
10audn-scenario-builder
Create custom adversarial attack scenarios for AI agent red-teaming. Supports prompt injection, jailbreak, data extraction, social engineering, emotional manipulation, and role confusion attacks. Use when the user wants to design a specific attack test.
9audn-quick-scan
Quick vulnerability scan of an AI agent endpoint. Runs only critical and high-severity attack scenarios for a fast security check. Use for a rapid smoke test before a full red-team audit.
8audn-login
Authenticate with Audn.ai for red-team security testing. Sets up OAuth login or API token. Run this before using any other audn skill. Use when the user needs to log in, authenticate, connect to Audn, or set up their API credentials.
8audn-agent-setup
Register and verify an AI agent on Audn.ai for security testing. Supports text API agents (OpenAI, Anthropic, custom LLMs) and voice agents (Twilio, Genesys, Amazon Connect). Use when the user wants to add a new agent to test.
8audn-compliance-report
Generate ISO 42001, SOC2, vulnerability, executive, or compliance reports from Audn.ai campaign results. Use when the user needs compliance evidence, audit documentation, or executive summaries of security testing.
8