Quant Sentinel

Automated penetration testing, powered by AI

22 specialist agents orchestrated across a 5-phase pipeline. White-box, grey-box, or black-box testing for web applications and APIs — with exploitation proof for every finding.

Sample output

See what Sentinel delivers

Executive summary, detailed findings with exploitation proof, CVSS scores, and remediation guidance — all generated automatically.

Security Assessment Report

app.acme-corp.com · 47 minutes

3 Critical 7 High 2 Medium

Quant Sentinel performed an automated security assessment of the ACME Corp web application, analysing both the running application and its source code repository. The assessment identified 12 vulnerabilities across the application's attack surface: 3 critical, 7 high, and 2 medium severity findings.

22
AI Agents
5
Pipeline Phases
OWASP
Top 10 Coverage
2–3 hrs
Full Assessment

Five-phase pipeline

Each assessment follows a structured pipeline that adapts to your target and testing mode.

1

Scoping

Analyses source code to identify attack surface, tech stack, and high-risk areas.

2

Pre-reconnaissance

Deep code analysis to find potential vulnerability patterns before live testing begins.

3

Reconnaissance

Browser-based mapping of the running application, authentication flows, and API endpoints.

4

Vulnerability + Exploitation

Parallel specialist agents analyse and exploit confirmed vulnerabilities with proof-of-concept.

5

Reporting

Executive summary, detailed findings with CVSS scores, and SARIF export for CI/CD integration.

Testing modes

Adapt to Any Engagement

Choose the testing mode that matches your access level. White-box adds deep source code analysis. Grey-box uses API specifications. Black-box relies entirely on dynamic testing — no source or spec required.

  • Pipeline adapts automatically to available information

  • Safe mode skips exploitation for risk-averse scans
  • Scoped analysis via source paths or URL rules
Testing modes
White-box
  • Source code
  • API spec
  • Browser testing
  • HTTP tools
Grey-box
  • Source code
  • API spec
  • Browser testing
  • HTTP tools
Black-box
  • Source code
  • API spec
  • Browser testing
  • HTTP tools
Choose based on your access level and target type

Target types

Web Apps, APIs, or Both

Webapp agents use Playwright for browser-based testing. API agents use HTTP and GraphQL tools. Hybrid mode runs all vulnerability types in parallel — 9 specialist agents covering both attack surfaces simultaneously.

  • 5 concurrent Playwright instances for webapp testing
  • OpenAPI and GraphQL spec ingestion
  • REST, GraphQL, and WebSocket endpoint discovery
Target types
Web application
5 vuln types
Playwright browser automation
Injection XSS Auth SSRF Authz
API
8 vuln types
HTTP & GraphQL tools
Injection Auth SSRF Mass assignment API misconfig API resource abuse API consumption Authz
Hybrid
9 vuln types
Browser + HTTP + GraphQL
All webapp + all API vulnerability types
OWASP-aligned vulnerability coverage

Configuration

Authenticate and Scope

Describe login flows in natural language. Support for form-based login, TOTP two-factor, OAuth2, and API keys. Define focus and exclusion rules to target specific areas of your application.

  • Natural language login flow descriptions
  • TOTP 2FA support built-in
  • URL path and subdomain scoping rules
sentinel.auth.yml
login_type : form
credentials :
username : admin@example.com
password : $${SENTINEL_PASSWORD}
totp_secret : $${SENTINEL_TOTP_SECRET}
login_flow : >
Navigate to /login, enter username and password,
enter TOTP code from authenticator app,
click Sign in button.
rules :
focus :
- /api/v1/**
- /dashboard/**
avoid :
- /logout
- /admin/delete-all

Automation

Security in Your Pipeline

Run Sentinel in CI/CD with —quiet mode. Export findings as SARIF 2.1.0 for integration with GitHub Security, GitLab SAST, and other scanning tools. Track costs per scan for budget management.

  • SARIF 2.1.0 with OWASP and CWE mappings
  • Docker image for containerised execution
  • Per-agent cost tracking and session metrics
CI/CD Pipeline main branch
Running
Push
Build
Test
Sentinel
Deploy
SARIF output sentinel.sarif
{
"version" : "2.1.0" ,
"runs" : [ { ... } ],
"results" : [
{ "ruleId" : "CWE-89" , "level" : "error" }
]
}
GitHub Actions · GitLab CI · Bitbucket Pipelines View docs

Reporting

Evidence, Not Assumptions

Every finding includes the vulnerable code, the exploitation proof-of-concept, and step-by-step remediation. Executive summaries for leadership, detailed technical findings for engineers.

  • CVSS 3.1 scoring with CWE references
  • Working exploitation proof for every finding
  • Actionable remediation with code examples
INJ-VULN-01

Critical · CVSS 9.8

SQL Injection in Search Endpoint

CWE-89 · src/pages/api/search.ts:47

// Vulnerable code
prisma.$queryRawUnsafe(
`SELECT * FROM products

WHERE name ILIKE ’%${req.query.q}%’`

)

Exploited: UNION SELECT version() returned PostgreSQL 16.2

Start your first automated pentest

Deploy Sentinel against your application and get a comprehensive security assessment in under an hour.

Full OWASP Top 10 coverage
Reports in under an hour
White-box, grey-box, or black-box
SARIF export for CI/CD