Shift
Shift is Caido's official AI/LLM plugin that can be instructed to automate tasks in your security assessments.
It consists of two main components: Shift Core and Shift Agents.
INFO
Shift is available for installation in the Official
tab of the Plugin interface.

Use Cases
As Shift integrates AI/LLM models directly into Caido's user-interface, the models are context-aware and have access to tools that can carry out actions within Caido. Using prompts written in natural language, you can assign tasks to a model of your choosing, such as:
Generate a wordlist of common sensitive files that may be publicly exposed.
Update this request to reflect this JS:
<response-body-javascript>
Create a M&R rule to replace the selected text with: isAdmin=true
Find similar requests to this.
TIP
Shift is highly capable and should be able to carry out any task you could do with a well-written prompt.
Configuration
To use Shift, register/login to https://openrouter.ai/ and obtain an API key.
NOTE
Certain models can be used for free while others cost credits. Actively monitor usage and consider setting a budget to avoid high costs.
Copy the key to your clipboard, navigate to the Settings
tab of the Shift interface, and paste it into the Enter API key
input field.
Within the Settings
interface, there are also options to limit the number of API calls a Shift Agent can make and an input field to provide a general system prompt or more contextual information about your target.

Shift Core
With Shift Core, you can provide direct instructions to the model by using the default keyboard shortcut CTRL
+ SPACE
, typing in a prompt, and pressing ENTER
or clicking on the button.


Shift Agents
With Shift Agents, you can assign tasks to a model that will be handled autonomously as background processes.

Custom Prompts
For common tasks, you can create and save reusable prompts by clicking on the + Add prompt
button within the Custom Prompts
tab.

NOTE
When writing custom prompts, provide detailed information and guidelines for the model to follow, such as:
- The root cause of the vulnerability.
- An example of its secure implementation.
- Example payloads or exploitation techniques.
- Examples of commonly vulnerable endpoints or components.
- Indications of successful exploitation.
- Resources to target after successful exploitation.
- Edge cases and similar vulnerabilities.
- Common testing mistakes that may produce false positives.

To use a custom prompt, click on the +
button within the message input field, select the prompt by name, and reference it in the message.

AI Session Renaming
Shift is also able to automatically rename Replay session tabs from their numerical names to descriptive names that identify the purpose of the request. To enable this feature, and configure additional settings, navigate to the AI Session Renaming
tab.
