Runs on every deploy, not once a year.
The agent re-attacks your production estate on the cadence you set — on-push, nightly, or the morning before a release — so your next pentest is never six months out.
A finding lands in your queue only after the agent re-ran it against your live target. The request, the response, and the full tool trace are in the report.
Outperforms commercial pentest teams on the public XBOW benchmark. Real-world CVEs disclosed via the open-source engine. Read the methodology at docs.pwnkit.com.
A live replay from a recent engagement, redacted. Each row is a tool call the agent issued against the target — the same trace ships in the report under every finding.
What this is not
Every head of AppSec has run a POC that wasted a week. These are the four patterns buyers have learned to distrust — and what we deliberately do instead.
No "start free trial" button. No credit-card form. You cannot point a free scanner at your own production estate the morning of an incident, and we know you have tried.
01No LLM wrapper around tools you already own. A separate engine with its own methodology and its own audit trail — built to chain a medium IDOR and a medium SSRF into a critical data-exfil path, not to summarise a Nuclei run.
02No discovery call. No qualification call. No deck about what the roadmap might ship next quarter. The first conversation is with the person who will run your first scan.
03The engine is open source. Your security team reads the prompts, tool list, and scoring harness before they trust a single finding. Every other vendor in this category ships a number you cannot verify.
04One engagement at a time, reviewed by the person who wrote the engine. No demo deck, no public price list, no shared queues.
The person running your scan wrote the code, signs your contract, and answers your team’s follow-up questions in the same thread.
Every action logged with timestamp, prompt, tool call, model version, and outcome — exported in a shape your SOC 2 auditor will actually accept.
Signed scope, action allowlist, and a kill switch you pull from your side. The agent will not issue a destructive call unless your scope explicitly authorises it.
Your security team reads the prompts, tool list, and scoring harness before the first finding lands — not after an incident review.
What it does
For the head of AppSec at a Series C SaaS who already knows the next pentest is six months out. These are the four things the agent actually does.
The agent re-attacks your production estate on the cadence you set — on-push, nightly, or the morning before a release — so your next pentest is never six months out.
It maps your auth flow, walks the IDOR into an SSRF into a credential leak, and only reports the chain once it has reproduced the full exploit end to end.
Each finding ships with the exact request, the exact response, the tool trace, the model version, and a reproduction you can paste into Burp.
One contract, one estate, one isolated runner pool — no cross-customer context, no shared model fine-tuning, deleted on the schedule your contract sets.
The seven questions every CTO and CISO evaluation call ends up at by minute eight. Answered up front so the first call can be about your estate, not ours.
If your next pentest is six months out and you cannot tell your board why, the form is below. We read every inquiry by hand and reply within one business day — usually with a no, sometimes with a calendar link.