# Security AI MCP Server v1.0
#
# INSTALLATION COMMANDS:
# python3 -m venv .venv
# source .venv/bin/activate  # On Windows: .venv\Scripts\activate
# pip install -r requirements.txt
# python3 security_mcp.py --server http://127.0.0.1:8888

# ============================================================================
# CORE FRAMEWORK DEPENDENCIES (REQUIRED)
# ============================================================================
requests>=2.31.0,<3.0.0         # HTTP library
psutil>=5.9.0,<6.0.0            # System utilities
fastmcp>=2.14.0                 # MCP framework (latest stable)
loguru>=0.7.0                   # Modern logging framework

# ============================================================================
# FLASK DEPENDENCY (CHOOSE ONE)
# ============================================================================
# Option 1: Flask 2.x (compatible with openapi-core, but not mitmproxy 11+)
flask>=2.3.0,<3.0.0

# Option 2: Flask 3.x (compatible with mitmproxy 11+, but not openapi-core)
# flask>=3.0.0,<4.0.0

# ============================================================================
# OPTIONAL DEPENDENCIES
# ============================================================================
# Uncomment the sections below if you need these features:

# Web Scraping & Automation (optional)
# beautifulsoup4>=4.12.0,<5.0.0
# selenium>=4.15.0,<5.0.0
# webdriver-manager>=4.0.0,<5.0.0

# Async & Networking (optional)
# aiohttp>=3.9.0,<4.0.0

# Proxy & Testing (requires Flask 3.x - conflicts with openapi-core)
# mitmproxy>=11.0.0

# ============================================================================
# INSTALLATION EXAMPLES
# ============================================================================
# Basic installation (Flask 2.x + web tools):
# pip install security-ai-mcp[basic]
#
# Proxy suite (Flask 3.x + proxy tools):
# pip install security-ai-mcp[proxy-suite]
#
# All features except proxy:
# pip install security-ai-mcp[all]

# ============================================================================
# EXTERNAL SECURITY TOOLS (150+ Tools - Install separately)
# ============================================================================
#
# security v6.0 integrates with 150+ external security tools that must be
# installed separately from their official sources:
#
# 🔍 Network & Reconnaissance (25+ tools):
# - nmap, masscan, rustscan, autorecon, amass, subfinder, fierce
# - dnsenum, theharvester, responder, netexec, enum4linux-ng
#
# 🌐 Web Application Security (40+ tools):
# - gobuster, feroxbuster, ffuf, dirb, dirsearch, nuclei, nikto
# - sqlmap, wpscan, arjun, paramspider, x8, katana, httpx
# - dalfox, jaeles, hakrawler, gau, waybackurls, wafw00f
#
# 🔐 Authentication & Password (12+ tools):
# - hydra, john, hashcat, medusa, patator, netexec
# - evil-winrm, hash-identifier, ophcrack
#
# 🔬 Binary Analysis & Reverse Engineering (25+ tools):
# - ghidra, radare2, gdb, binwalk, ropgadget, checksec, strings
# - volatility3, foremost, steghide, exiftool, angr, pwntools
#
# ☁️ Cloud & Container Security (20+ tools):
# - prowler, scout-suite, trivy, kube-hunter, kube-bench
# - docker-bench-security, checkov, terrascan, falco
#
# 🏆 CTF & Forensics (20+ tools):
# - volatility3, autopsy, sleuthkit, stegsolve, zsteg, outguess
# - photorec, testdisk, scalpel, bulk-extractor
#
# 🕵️ OSINT & Intelligence (20+ tools):
# - sherlock, social-analyzer, recon-ng, maltego, spiderfoot
# - shodan-cli, censys-cli, have-i-been-pwned
#
# Installation Notes:
# 1. Kali Linux 2024.1+ includes most tools by default
# 2. Ubuntu/Debian users should install tools from official repositories
# 3. Some tools require compilation from source or additional setup
# 4. Cloud tools require API keys and authentication configuration
# 5. Browser Agent requires Chrome/Chromium and ChromeDriver installation
#
# For complete installation instructions and setup guides, see README.md
