Skip to main content

The CLI that tests your app like a crazy QA tester

One command. AI opens your app in a browser, clicks everything, types garbage into every field, rage-refreshes, finds that one XSS you swore you fixed, and writes you a report. No test scripts. No config files. Just chaos with a purpose.

Let the chaos begin — break your app before your users do.

Install:

Run:

Supported AI Providers

Auggie by Augment Code — AI testing providerAuggie
Claude Code by Anthropic — AI testing providerClaude Code
Codex by OpenAI — AI testing providerCodex
OpenCode — AI testing providerOpenCode

100% open-source — contribute, fork, or just poke around.

Star us on GitHub

See GetWired in Action

Recommended place to run it is in Intent. Also works in any terminal, IDE integrated terminal, or CI environment.

NOTES / SPEC

Hacky Testing — Signup Flow

Overview

Probe the signup flow like a malicious user. Test for injection vulnerabilities, auth bypass, parameter tampering, IDOR, CSRF, and other common web security issues.

Attack Surface

  • · Form inputs: name, email, password — XSS, SQLi
  • · API routes: /api/users/:id — IDOR, auth bypass
  • · Hidden fields: price, role — parameter tampering
  • · Session: CSRF tokens, cookie flags, replay attacks

Target

  • · GET /signup, POST /api/signup, GET /admin
  • · Persona: hacky (adversarial, security-focused)
  • · Provider: auggie

Tasks

Probe /admin route — is it auth-protected?
Test IDOR on /api/users/:id
Inject XSS payloads in all text inputs
Check CSRF token on form submissions
Tamper with hidden price field in progress
Submit negative quantities
Add ?role=admin to signup URL
Check cookie security flags (HttpOnly, Secure)

How It Works (It's Stupidly Simple)

1. Point It at Your App

Run npx getwired init in your project. It detects your framework and dev server. That's the entire setup. No YAML. No 200-line config. Just go.

2. AI Goes Full Gremlin

Pick your AI (Claude Code, Auggie, Codex, or OpenCode). It opens a real browser and does everything your most chaotic user would — rage-clicks, submits forms with emoji, resizes to 200px, finds your unlocked admin page.

3. Read the Damage Report

You get an HTML report with screenshots, bug descriptions, XSS findings, and severity ratings. Fix the embarrassing stuff before your users find it. Ship with confidence (or at least fewer nightmares).