What AI MiniReper is
AI MiniReper is the in-product AI workspace for minirep. It is not just a chatbot attached to the extension. It is built around:
- real request/response context
- selected and pinned flows
- extractor findings
- bounded audit and replay behavior
Its job is to help you understand what you captured, decide what is worth testing, and in Agent mode, push that workflow into structured follow-up validation.
Ask mode
Use Ask mode when you want reasoning without automated audit execution.
Good uses for Ask mode:
- explaining a request or sequence of requests
- summarizing likely vulnerability classes
- identifying auth or cache assumptions
- generating ideas for next manual probes
- interpreting suspicious response patterns
Ask mode is the fastest way to turn raw traffic into an understandable narrative.
Agent mode
Use Agent mode when you want a more adversarial workflow.
In this mode, AI MiniReper can:
- produce structured
attack-suggestionoutputs - convert those outputs into concrete requests
- auto-run bounded variants through the request sender
- analyze the resulting responses
The goal is not unbounded autonomous exploitation. The goal is fast, structured, operator-guided validation that stays tied to real context.
Active context
AI quality in minirep depends on context quality.
AI MiniReper builds context from:
- the selected request
- multi-selected requests
- pinned requests
- extractor findings you choose to add
- a lightweight local memory summary
That means the AI is not reasoning from abstract prompts alone. It is reasoning from the same concrete evidence you are looking at.
Extractor handoff
One of the best parts of the AI workflow is the extractor handoff.
You can:
- run the Extractor
- review findings by tab
- pick the ones that matter
- add them to AI context
This is especially effective when you want the model to reason from:
- specific endpoint findings
- discovered parameters
- security header issues
- Supabase findings
- suspicious secrets or response matches
Feasible checklist
The AI checklist gives you a practical, bounded workflow for common reconnaissance and validation steps.
It includes:
- passive fingerprinting
- security header and cookie review
- comment review
- leaked identifier review
- WAF/CDN detection
- URL and JavaScript inventory
- admin/login discovery
- robots and well-known file probes
- CORS and allowed method probes
- site structure and business-context reasoning
The checklist is valuable because it is anchored to observed traffic and constrained probes, not arbitrary unrelated scanning.
Auto-run model
Agent mode supports bounded auto-run.
The current model:
- parses generated attack suggestions
- runs a limited number of generated variants
- captures their responses
- performs a follow-up AI analysis of the results
This keeps the automation loop useful while still making the operator the decision-maker.
Progress visibility
The product surfaces progress explicitly so you can see the audit lifecycle:
- prepare
- request
- response
- parse
- auto-run
- analyze
That makes the AI workflow easier to trust and easier to debug.
Providers and settings
Supported providers include:
- OpenAI
- Google Gemini
- Anthropic Claude
- Grok / xAI
- DeepSeek
- Perplexity
The panel supports:
- provider selection
- model selection
- API key entry
- optional custom base URL for OpenAI-compatible setups
Practical advice
AI MiniReper is strongest when you give it disciplined context:
- choose the smallest relevant request set
- pin only what matters
- add extractor findings intentionally
- use
Askmode first to understand the flow - use
Agentmode when you are ready to validate bounded variants
That keeps the output more relevant and makes the auto-run loop much more useful.