Temodar Agent is now listed in awesome-bugbounty-tools — a curated bug bounty resources list with 5.9k+ GitHub stars.
AI agent-powered WordPress security scanner for plugin and theme triage, Semgrep analysis, and source-aware investigation workflows.
Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security teams, auditors, and defenders. It combines AI agent workflows, multi-provider LLM orchestration, Semgrep-powered static analysis, and risk-based WordPress reconnaissance in one local-first Docker application.
If you are looking for an AI security scanner for WordPress plugins, an AI agent workflow for code review, or a Semgrep-based vulnerability triage platform, Temodar Agent is designed to make that process faster, more structured, and easier to scale.
Temodar Agent helps teams identify which WordPress plugins and themes deserve attention first, run repeatable code analysis, and continue investigation with AI agent systems that stay attached to the target under review.
Core platform capabilities include:
- WordPress plugin and theme scanning
- risk-based target prioritization
- Semgrep-powered static application security testing
- AI agent-assisted investigation threads
- multi-provider AI configuration and execution
- custom Semgrep rule management
- local result persistence and historical review
Temodar Agent is built around an AI agent workflow rather than a simple chat box.
- Open dedicated AI threads per plugin or per theme
- Prepare a trusted source workspace for the selected target before deeper review
- Keep thread-level context attached to the investigation, including:
- conversation summary
- analysis summary
- findings summary
- architecture notes
- important files
- last prepared source path
The current runtime supports multiple AI execution strategies that are already exposed in the application:
- agent
- team
- tasks
- fanout
- auto
This makes Temodar Agent suitable for teams that want to move from a single-agent workflow to more advanced multi-agent analysis patterns inside the same product.
The platform also supports:
- custom
agentspayloads - custom
taskspayloads - fanout configuration
- loop detection settings
- trace and runtime event streaming
- before-run and after-run hook payloads
- manual approval mode
- auto-approve mode
- structured AI output when an output schema is provided
Temodar Agent includes a multi-provider AI configuration system with stored profiles, active profile switching, and connection testing.
Supported providers currently present in the application:
- Anthropic
- OpenAI
- Copilot
- Gemini
- Grok
Provider system features already implemented:
- multiple saved provider profiles
- active provider switching
- model selection per profile
- model list storage per profile
- provider connection testing
- optional custom base URL support
- masked API key handling in the UI layer
Temodar Agent includes a production-oriented Semgrep analysis workflow for WordPress source code review.
The current application ships with support for these default Semgrep rulesets:
- OWASP Top 10
- PHP security
- security audit
The current Semgrep system also supports:
- custom Semgrep rule creation
- custom rule deletion
- rule enable / disable toggling
- bulk enable / disable operations
- ruleset add / remove / toggle actions
- validation of custom rule documents
- bulk Semgrep scanning across a scan session
- persistent local storage for Semgrep outputs
This makes Temodar Agent useful not only as an AI security research tool, but also as a Semgrep operations layer for teams that maintain their own detection logic.
Temodar Agent helps security teams reduce noise before manual review starts.
The scanning system can:
- scan WordPress plugins or themes from public sources
- filter by install counts and update windows
- identify abandoned or user-facing targets
- prioritize packages using metadata, tags, and security-related signals
- assign relative risk labels for faster triage
- stream progress to the dashboard in real time
- store scan sessions for later comparison and follow-up
Temodar Agent is designed for organizations that want:
- a faster way to review large WordPress plugin ecosystems
- an AI agent layer on top of source code analysis
- a bridge between Semgrep findings and human investigation
- reusable investigation memory per target
- a local-first workflow for security research and internal review
Temodar Agent is designed to run with Docker.
You need:
- Docker installed and running
- permission to run Docker commands on your machine
Useful links:
git clone https://github.com/xeloxa/temodar-agent.git
cd temodar-agentchmod +x run.sh
./run.shIf you want to run a specific released version, clone the repository at the desired tag:
git clone --branch v0.1.0 --depth 1 https://github.com/xeloxa/temodar-agent.git
cd temodar-agentReplace v0.1.0 with the release tag you want to use.
Note Clone the project with
gitinstead of downloading a release ZIP if you want the UI update flow to work correctly. The in-app Docker update mechanism expects the workspace to be a valid git checkout.
The launcher script automatically:
- builds the Docker image if needed
- starts the Temodar Agent container
- exposes the dashboard on port 8080
- mounts persistent local directories for app state, plugin cache, and Semgrep results
- starts the host-side update watcher used by the app
Open the dashboard at:
Temodar Agent keeps important data on your host machine:
./.temodar-agent— app state and local database./Plugins— downloaded plugin and theme cache./semgrep_results— Semgrep scan outputs
- Start Temodar Agent with
./run.sh - Open the local dashboard
- Launch a WordPress plugin or theme scan
- Review risk labels and prioritized targets
- Run Semgrep on a selected target or across a session
- Open an AI thread for source-aware follow-up analysis
- Continue investigation with stored context, thread memory, and runtime events
While run.sh is active:
- Press R to rebuild and restart everything
- Press Q to stop the app
- Press Ctrl+C to exit
This project is intended for authorized security research, defensive analysis, and educational use only. It is designed to help researchers and developers assess WordPress plugin and theme attack surfaces, prioritize risky targets, and review code more efficiently.
Do not use this software against systems, plugins, themes, or environments you do not own or do not have explicit permission to test. The author and contributors are not responsible for misuse, damage, service disruption, data loss, or any legal consequences resulting from improper use.
Always ensure your testing is authorized and compliant with applicable laws, regulations, and disclosure policies.


