Noir is a SAST tool that reads source code and extracts the endpoints an application exposes — paths, methods, parameters, headers, cookies, and the source files behind them. Shadow APIs, deprecated routes, and undocumented handlers come out as part of the same inventory; they aren't a separate mode.
The inventory feeds three audiences:
- Human reviewers. Security engineers and code auditors get a focused list of attacker-reachable entrypoints — paths, parameters, source files, tags — instead of skimming the whole repo.
- AI auditors. LLM-based SAST agents get the same focused list, plus per-endpoint review context (
--include-calleefor 1-hop callees,--ai-contextfor guards, sinks, validators, and signals). - DAST tools. ZAP, Burp Suite, and Caido get a real route list to scan, including paths they would never have reached by crawling.
- Endpoint Extraction. Static analysis across 50+ frameworks. Returns endpoints, parameters, headers, cookies, and the source files they came from.
- LLM Fallback. Hand unsupported frameworks (or one-off custom routing) to OpenAI / Ollama / etc. when static rules don't apply.
- AI SAST Context. The endpoint inventory is the focused context an LLM auditor needs to find attacker-reachable bugs.
--include-calleeattaches 1-hop callees;--ai-contextadds aggregated review context per endpoint — guards, sinks, validators, and signals. - DAST Integration. Pipe directly into ZAP, Burp Suite, or Caido as a proxy target, or export OpenAPI for them to import.
- Multi-Format Output. JSON, YAML, OpenAPI, SARIF, cURL, Postman, HTML, and more — whichever format the next tool in the pipeline reads.
- CI/CD Ready. GitHub Action, SARIF output, exit codes. Fits the pipeline you already have.

