Authenticated active scans
with evidence the auditor will accept
OpenAPI-driven, ZAP Automation Framework under the hood, with an AI Pentester layer for the hard cases. Every finding ships with CWE, CVSS, payload, evidence, and EPSS + KEV exploitability priority. SARIF 2.1.0, 5-framework compliance mapping, and a sha256-anchored attestation certificate per run.
30 days · No card required · Authenticated full-active scans included
15 industry-standard engines, one unified schema
We don't reinvent scanners. We orchestrate them, parse their structured output, dedup with a deterministic signature, and enrich with AI + EPSS + KEV.
OWASP ZAP (AF)
DAST
Nuclei v3
Templates
Nikto
Web misconfig
Wapiti
Active scan
testssl.sh
TLS
sqlmap
SQL injection
Dastardly
CI-fast DAST
httpx
Recon
naabu
Port scan
subfinder
Subdomains
katana
Crawler
trufflehog
Secrets
jwt_tool
JWT
Trivy
SBOM/CVE
graphql-cop
GraphQL
What you get
Everything an enterprise security review demands, with the surface a developer can actually use.
Authenticated active scans
OAuth-CC, bearer, basic, JWT, session-cookie, header. Auth profiles attach to targets — credentials live in Secret Manager and are injected at job start, never typed at run time.
OpenAPI + GraphQL spec-driven
Point us at /openapi.json or your GraphQL endpoint. ZAP AF requestor → activeScan tests every endpoint as authenticated. graphql-cop probes introspection + DOS.
AI Triage + Planner + Pentester
Gemini auto-enriches every finding with confidence + remediation. Claude tool-use loop runs interactive pentests with hard caps (12 turns, 200k tokens, $5/run, kill-switch).
Compliance + attestation
SARIF 2.1.0 for GitHub Code Scanning. OWASP Top-10, PCI-DSS 4.0, NIST 800-53, ISO 27001, SOC 2 mapping. Sha256-anchored attestation certificate downloadable per run.
Findings v2 schema
Every finding ships with CWE, WASC, plugin id, CVSS vector + score, attack payload, evidence ref, instances count, deterministic dedup signature. EPSS + CISA KEV priority on top.
Server-side scope guardrails
RFC1918, link-local, loopback, cloud-metadata (AWS+GCP+Azure) blocked at create + dispatch. DNS rebinding protection re-checks all resolved IPs. No accidental SSRF/internal scans.
Verify-fix workflow
One click re-runs a finding's exact tool + endpoint to confirm a fix landed. Child finding links back to parent so the timeline survives across sprints.
Real-time governance
Atomic dispatch quotas, retention sweeper with 30d grandfather window, per-tenant audit log (365d TTL), platform-admin tenant observation with audit trail.
How Vulnios PT compares
We're honest: at the autonomous-loop depth, XBOW + RunSybil are further along. We're broader, cheaper at the trial+starter end, and ship the operator workflow + compliance pack you actually need.
| Capability | Vulnios PT | XBOW | Pentera | Detectify |
|---|---|---|---|---|
| Self-serve trial | 30 days, no card | Demo only | Sales contact | 14 days |
| AI Pentester (interactive) | Claude tool-use | Yes (proprietary) | Limited | No |
| OpenAPI spec-driven | Yes | Yes | Yes | Yes |
| SARIF export | 2.1.0 + GitHub CS | Yes | Yes | Yes |
| Verify-fix workflow | Built-in | Yes | Yes | Manual |
| Compliance mapping | 5 frameworks | 3 | 3 | 2 |
| Attestation certificate | sha256-anchored | Report only | Report only | Report only |
| Per-finding EPSS + KEV priority | Built-in | Add-on | Add-on | No |
| Public REST API + webhooks | Bearer + HMAC | Yes | Yes | Yes |
| Tenant-isolated multi-tenant | Yes | Yes | Yes | Yes |
| Pricing transparency | Public tiers | Sales-led | Sales-led | Public |
Comparison reflects publicly-documented capabilities as of 2026-05. Send a correction to hello@vulnios.com if anything looks off.