diff --git a/README_EN.md b/README_EN.md
new file mode 100644
index 0000000..0a1587b
--- /dev/null
+++ b/README_EN.md
@@ -0,0 +1,427 @@
+# DeepAudit - Your AI Security Audit Team, Making Vulnerability Discovery Accessible
+
+> Making code vulnerability discovery as easy as breathing, even beginners can find bugs
+
+
+
+### Professional Reports
+
+
+
+*One-click export to PDF / Markdown / JSON* (Quick mode shown, not Agent mode report)
+
+[View Full Agent Audit Report Example](https://lintsinghua.github.io/)
+
+
+
+---
+
+## Overview
+
+**DeepAudit** is a next-generation code security audit platform based on **Multi-Agent collaborative architecture**. It's not just a static scanning tool, but simulates the thinking patterns of security experts through autonomous collaboration of multiple agents (**Orchestrator**, **Recon**, **Analysis**, **Verification**), achieving deep code understanding, vulnerability discovery, and **automated sandbox PoC verification**.
+
+We are committed to solving three major pain points of traditional SAST tools:
+- **High false positive rate** — Lack of semantic understanding, massive false positives consume manpower
+- **Business logic blind spots** — Cannot understand cross-file calls and complex logic
+- **Lack of verification methods** — Don't know if vulnerabilities are actually exploitable
+
+Users only need to import a project, and DeepAudit automatically starts working: identify tech stack → analyze potential risks → generate scripts → sandbox verification → generate report, ultimately outputting a professional audit report.
+
+> **Core Philosophy**: Let AI attack like a hacker, defend like an expert.
+
+## Why Choose DeepAudit?
+
+
+
+| Traditional Audit Pain Points | DeepAudit Solutions |
+| :--- | :--- |
+| **Low manual audit efficiency** Can't keep up with CI/CD iteration speed, slowing release process | **Multi-Agent Autonomous Audit** AI automatically orchestrates audit strategies, 24/7 automated execution |
+| **Too many false positives** Lack of semantic understanding, spending lots of time cleaning noise daily | **RAG Knowledge Enhancement** Combining code semantics with context, significantly reducing false positives |
+| **Data privacy concerns** Worried about core source code leaking to cloud AI, can't meet compliance requirements | **Ollama Local Deployment Support** Data stays on-premises, supports Llama3/DeepSeek and other local models |
+| **Can't confirm authenticity** Outsourced projects have many vulnerabilities, don't know which are truly exploitable | **Sandbox PoC Verification** Automatically generate and execute attack scripts, confirm real vulnerability impact |
+
+
+
+---
+
+## System Architecture
+
+### Architecture Diagram
+
+DeepAudit adopts microservices architecture, driven by the Multi-Agent engine at its core.
+
+
+
+---
+
+## Acknowledgements
+
+Thanks to the following open-source projects for their support:
+
+[FastAPI](https://fastapi.tiangolo.com/) · [LangChain](https://langchain.com/) · [LangGraph](https://langchain-ai.github.io/langgraph/) · [ChromaDB](https://www.trychroma.com/) · [LiteLLM](https://litellm.ai/) · [Tree-sitter](https://tree-sitter.github.io/) · [Kunlun-M](https://github.com/LoRexxar/Kunlun-M) · [Strix](https://github.com/usestrix/strix) · [React](https://react.dev/) · [Vite](https://vitejs.dev/) · [Radix UI](https://www.radix-ui.com/) · [TailwindCSS](https://tailwindcss.com/) · [shadcn/ui](https://ui.shadcn.com/)
+
+---
+
+## Important Security Notice
+
+### Legal Compliance Statement
+1. **Any unauthorized vulnerability testing, penetration testing, or security assessment is prohibited**
+2. This project is only for cybersecurity academic research, teaching, and learning purposes
+3. It is strictly prohibited to use this project for any illegal purposes or unauthorized security testing
+
+### Vulnerability Reporting Responsibility
+1. When discovering any security vulnerabilities, please report them through legitimate channels promptly
+2. It is strictly prohibited to use discovered vulnerabilities for illegal activities
+3. Comply with national cybersecurity laws and regulations, maintain cyberspace security
+
+### Usage Restrictions
+- Only for educational and research purposes in authorized environments
+- Prohibited for security testing on unauthorized systems
+- Users are fully responsible for their own actions
+
+### Disclaimer
+The author is not responsible for any direct or indirect losses caused by the use of this project. Users bear full legal responsibility for their own actions.
+
+---
+
+## Detailed Security Policy
+
+For detailed information about installation policy, disclaimer, code privacy, API usage security, and vulnerability reporting, please refer to [DISCLAIMER.md](DISCLAIMER.md) and [SECURITY.md](SECURITY.md) files.
+
+### Quick Reference
+- **Code Privacy Warning**: Your code will be sent to the selected LLM provider's servers
+- **Sensitive Code Handling**: Use local models for sensitive code
+- **Compliance Requirements**: Comply with data protection and privacy laws
+- **Vulnerability Reporting**: Report security issues through legitimate channels