Introduction
Overview
Cirro is a comprehensive security research tool designed to help penetration testers and security researchers map and analyze cloud environments across multiple platforms. Today, the project includes modules for Azure and Tailscale, with an architecture designed to support additional platforms over time.
Cirro uses a modular workflow with platform-specific collectors and graph schema mappings. This allows the same core tooling to ingest different data models and relationship structures without changing analyst workflows.
Get up and running with Cirro in minutes. Install, collect data, ingest into Neo4j, and begin graph analysis.
Security Notice
Cirro is designed for authorized security testing and research. Ensure you have proper permissions before running against any cloud environment.
Key Features
Platform-Aware Collection
- Multi-source Inputs: Collect from supported cloud, identity, and network APIs
- Relationship Data: Capture principals, resources, memberships, and trust links
- Extensible Modules: Add new collectors through feature-based platform modules
Flexible Authentication
- CLI-based Auth: Reuse authenticated local tooling where available
- Token-based Auth: Use pre-obtained access tokens
- Certificate Auth: Authenticate with client certificates
- Secret-based Auth: Authenticate with service credentials
Graph Workflow
- Neo4j Ingestion: Load collected data into a graph database for analysis
- Schema Mapping: Transform platform data into consistent nodes and edges
- Export Support: Export graph data for downstream tooling
YAML-Driven Mapping Extensibility
- Platform Logic in Code: New platform collectors and ingestors are implemented as Rust modules
- YAML Graph Specs: Extend node/edge mappings through YAML definitions used by ingestion
- Reusable Pipeline: Keep a consistent ingest and analysis workflow across supported sources
Use Case Examples
Security Testing
Map complex environments during security assessments to identify:
- Privilege escalation paths
- Misconfigured permissions
- Trust relationships
- Environment reconnaissance
- Attack path planning
Defensive Security
Strengthen platform security posture by analyzing:
- Security posture assessment
- Access control validation
- Risk identification
- Security monitoring gaps
- Configuration hardening