Requires: A valid Claude API key configured in Settings → AI Configuration. All 60+ scan tools must be installed. Authorization token from the client is mandatory before any active scan.

How Claude Orchestrates Your Pentest

In Automated AI Mode, Claude is not just a report writer — it drives the entire engagement using tool-use (function calling). Claude receives your target, scope, and wizard answers, then autonomously decides which tools to run, in what order, and adapts its strategy based on each result.

Claude's Agentic Loop

  • Receives: target, engagement type, scope, authorization token, wizard Q&A
  • Calls tools as functions: run_nuclei, run_sqlmap, run_nmap, add_finding, read_finding…
  • Evaluates each tool result and decides next action
  • Chains related findings into attack paths automatically
  • Re-tests high-severity findings to confirm and gather PoC evidence
  • Writes professional narrative for each confirmed finding
  • Generates final report with executive summary and remediation roadmap

Privacy: What Claude Never Sees

Before every API call, the PrivacyFilter anonymizes all sensitive data. Claude only ever receives reference tokens — never actual client targets, IPs, company names, or credentials.

What the Claude API receives (anonymized): "Found SQL injection at [TARGET_URL_1]/api/users — affects [COMPANY_REF]" What stays local (reference map, never sent): [TARGET_URL_1] → https://app.client.com [COMPANY_REF] → ClientCorp Inc After response: PrivacyFilter.restore() puts real values back locally.

Tool Library (60+ tools as callable functions)

Web: run_zap, run_nuclei, run_sqlmap, run_xsstrike, run_ffuf, run_nikto API: run_kiterunner, run_jwt_tool, run_graphql_cop, run_bola_engine Network: run_nmap, run_masscan, run_metasploit, run_crackmapexec Cloud: run_prowler, run_trufflehog, run_pacu Mobile: run_mobsf, run_frida, run_objection, run_apktool RE: run_ghidra, run_radare2, run_angr, run_strings AI/LLM: run_garak, run_promptmap Reports: generate_report, add_finding, read_finding, get_attack_graph

Common Issues

Claude API calls have a 300-second timeout. If a tool call is hanging, the watchdog will automatically rollback to the last good state and retry. Check the AI Activity Log for the last successful tool call. If the issue persists, pause and resume the scan.

Every tool invocation passes through the scope enforcement gate before execution. If a target is outside the declared scope, the tool call is blocked and logged. Review your scope definition in Wizard Step 4. You can update scope mid-scan from Scan Dashboard → Edit Scope.

Switch to "Full" intensity in the wizard for maximum coverage. Also ensure credentials are provided (Wizard Step 6) — authenticated scanning finds significantly more issues than unauthenticated. Check that all relevant attack surfaces are selected in Wizard Step 3.

This is correct behavior. The AI Activity Log shows what was sent to the Claude API (anonymized). The actual finding details panel shows real values after PrivacyFilter.restore() is applied. This is by design for audit trail security.