I built Wiz because I was tired of context-switching between
remembering tool syntax and actually doing security work.
## Background
I've been doing security assessments for a while, and the workflow is always:
1. Remember the right tool for the job
2. Look up the flags (again)
3. Run the command
4. Parse the output manually
5. Copy findings to a spreadsheet
6. Repeat 100 times
7. Manually write the report
## What Wiz Does
Wiz lets you describe what you want in natural language:
"check if this Apache server is vulnerable to path traversal"
And it:
1. Selects the right tools (nuclei with CVE-2021-41773 templates)
2. Runs them with correct parameters
3. Parses the output into structured findings
4. Classifies by severity (Critical/High/Medium/Low)
5. Stores with evidence for the report
6. Generates professional reports when you're done
## Technical Details
Built on OpenCode (https://github.com/sst/opencode), which provides:
- Superior agent architecture vs generic LLM CLIs
- Extensible tool framework with typed I/O
- Multi-LLM support (Claude, GPT-4, Gemini, local models)
https://www.wiz.io