This agent is designed to perform reverse engineering and analysis of .NET binaries.
It can decompile .NET assemblies and leverage a large language model (LLM) to analyze the source code based on a user-defined task, such as identifying security vulnerabilities.
The agent can process binaries from a local file path or directly fetch them from the NuGet package repository.
It operates asynchronously and can run multiple analysis instances in parallel.
The primary purpose of this agent is to assist security researchers and developers in automating the process of scanning .NET applications for potential security flaws.
A user can provide a high-level task, like “Find only critical vulnerabilities,” and the agent will use its tools to decompile the code and use an LLM to analyze it, reporting any findings.
It can also be used as a simple utility to decompile and view the source code of .NET assemblies.
The agent is a command-line application built with Python.
It requires a Python environment with the necessary libraries installed, as specified in the script.
It interacts with the public NuGet API (api.nuget.org) to fetch packages.
For its analysis capabilities, it relies on a configured language model, which can be a remote API (like GPT-4o-mini) or a locally hosted model (e.g., via Ollama).
For observability and task tracking, it can be optionally connected to a Dreadnode server.