Threat Model
The Threat Model appears on the assessment detail page once your pentest has started and the discovery phase is finished. This model provides a transparent, real-time view of how our agents perceive and test your application's security posture.
Prerequisites
Your code repositories must be linked in the pentest.
Recon Report
The Recon Report is a high-level summary of what was discovered during the initial discovery phase. It provides a readable overview of your application's attack surface, helping you understand the "attacker's view" before reviewing specific exploit attempts.
It gives you a quick view of the application's attack surface, including:
Endpoints
Technologies in use
Authentication mechanisms
Areas of interest for further testing
Use this report to identify and decommission unnecessary exposed assets or to verify that your intended security controls are visible to the scanner.
Attack Plan
The Attack Plan is a structured table of the specific attack vectors for your application. Each row represents a targeted test focused on a specific code snippet or a particular architectural vulnerability hypothesis.
Every entry shows:
Starting assumption: what the agent is testing, plus the targeted file or endpoint
Type: the vulnerability category being tested, such as injection or authentication bypass
Agent: the specific attacker agent assigned to the task
Status: the current state of the attack
Not Started - the agent has not begun yet
In Progress - the agent is actively running
Exploitable - the agent found an exploitable issue
No issues found - the agent completed without finding vulnerabilities
Stopped - the agent was cancelled
Last updated
Was this helpful?