{"id":"threat9-routersploit","name":"routersploit","homepage":null,"repo_url":"https://github.com/threat9/routersploit","category":"security","subcategories":[],"tags":["ai-ml","security","exploitation","embedded","router","scanner","bruteforce","creds","payloads","python"],"what_it_does":"RouterSploit is an open-source Python exploitation framework for embedded devices. It provides modular components for exploitation, credential checking, vulnerability scanning, payload generation, and generic attacks, run via a CLI entry point (e.g., rsf.py) and optionally via Docker.","use_cases":["Security testing of embedded/router targets with explicit authorization","Scanning for potentially vulnerable services on embedded devices","Credential testing modules against network services","Selecting and running exploit modules for known embedded-device weaknesses","Generating payloads for various architectures/injection points"],"not_for":["Unauthorized access or exploitation of systems","Production systems requiring strong safety rails/guardrails","Programmatic use as a stable SaaS/API service (it is a local framework)","Environments where automated credential attacks are prohibited"],"best_when":"Used in controlled penetration-testing workflows against embedded devices where you have permission, and where you can operate a local Python toolchain.","avoid_when":"You need a well-defined remote API/SDK for integration, or you require strict security governance and minimal risk of misuse.","alternatives":["Metasploit Framework (general purpose exploitation framework)","Nuclei (vulnerability scanning, templates-driven)","OpenVAS/Greenbone (vulnerability management/scanning)","RouterScan / vendor-specific assessment tools (where applicable)","Exploit-DB + custom scripts (for narrower use cases)"],"af_score":27.8,"security_score":16.5,"reliability_score":26.2,"package_type":"skill","discovery_source":["openclaw"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-29T13:21:55.434323+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No product authentication mechanism is described; it is a local tool run by the user against targets."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source (BSD license mentioned). No hosted pricing details provided."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":27.8,"security_score":16.5,"reliability_score":26.2,"mcp_server_quality":0.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":100.0,"rate_limit_clarity":0.0,"tls_enforcement":0.0,"auth_strength":10.0,"scope_granularity":0.0,"dependency_hygiene":40.0,"secret_handling":40.0,"security_notes":"As a local exploitation framework, it inherently increases risk of misuse. README lists dependencies (requests, paramiko, pysnmp, pycrypto) and suggests potential use of Bluetooth support via bluepy; no information is provided about secure transport policies, secret handling practices, or vulnerability management for dependencies. No auth model is applicable beyond user-operated targeting.","uptime_documented":0.0,"version_stability":45.0,"breaking_changes_history":40.0,"error_recovery":20.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["No explicit agent-friendly API/MCP; automation likely requires invoking the CLI and parsing output.","Framework updates are described as frequent and may change module behavior; pin versions for repeatability.","Includes modules for credential testing and exploitation, which may require strict policy controls."]}}