// PIPELINE
Three steps. Zero infrastructure.
No agents to install, no credentials to share. Read-only by default; escalate on demand.
01
Connect your surface
Point us at a domain, an OpenAPI spec, or a GitHub org. We map the attack surface in minutes — subdomains, endpoints, dependencies, cloud assets.
02
Agents go to work
Specialized agents — recon, web, auth, cloud — collaborate under an orchestrator that decides which exploit chains to attempt and in what order.
03
Triaged report
Reproducible proof-of-concepts, blast-radius analysis, and remediation diffs land in your tracker (Linear, Jira, GitHub) within hours.
Architecture at a glance
┌─ Targets ─────────────────────────────┐
│ domains · APIs · repos · cloud accts │
└────────────────┬──────────────────────┘
▼
┌──── Orchestrator ────┐
│ plans exploit DAG │
└─┬────┬─────┬─────┬───┘
▼ ▼ ▼ ▼
recon web auth cloud ◄── specialized agents
└────┴──┬──┴─────┘
▼
┌── Sandbox runner ──┐
│ proof-of-concepts │
└─────────┬──────────┘
▼
Triaged report