Overview
AutoPentestX automatically generates professional PDF reports using ReportLab after each scan completes. These reports provide a comprehensive overview of all findings, vulnerabilities, and recommendations in a format suitable for stakeholders and compliance purposes.Report Structure
Each PDF report contains the following sections:Cover Page
Cover Page
Contains essential metadata about the assessment:
- Target System: IP address or hostname
- Scan ID: Unique identifier for database correlation
- Report Date & Time: When the scan was conducted
- Prepared By: Tester name (default: AutoPentestX Team)
- Confidentiality Notice: Warning about sensitive information
Executive Summary
Executive Summary
High-level overview for decision-makers:
- Overall risk level with color-coded severity
- Total vulnerabilities identified
- Critical/High risk item count
- Web vulnerability and SQL injection statistics
- Critical finding warnings for HIGH/CRITICAL risk systems
Scan Details
Scan Details
Technical information about the assessment:
- Target IP/hostname
- Operating system detection results
- Scan duration (in seconds)
- Total open ports discovered
- Scan methodology (Nmap, Nikto, SQLMap)
Open Ports and Services
Open Ports and Services
Comprehensive table of discovered network services:
- Port number
- Protocol (TCP/UDP)
- State (open/filtered)
- Service name
- Version information (truncated to 30 characters)
Vulnerabilities Identified
Vulnerabilities Identified
Combined table of all vulnerabilities:
- Port number
- Vulnerability name (truncated to 40 characters)
- Severity level (CRITICAL/HIGH/MEDIUM/LOW)
- CVE identifier (if applicable)
- Regular vulnerabilities from service scanning
- CVE database lookup results (limited to 15 CVEs)
Risk Assessment
Risk Assessment
Detailed risk analysis:
- Overall risk level determination
- Total risk score calculation
- Average risk per port metric
- High risk items breakdown (up to 10 items)
- Port-specific risk scores (0-10 scale)
Exploitation Assessment
Exploitation Assessment
Safe-mode exploitation findings:
- Total exploits identified
- Exploitation attempt results (up to 10)
- Status indicators (SIMULATED/SKIPPED/SUCCESS)
- Exploit descriptions
Security Recommendations
Security Recommendations
Prioritized remediation guidance:
- CRITICAL Priority: Immediate action items
- HIGH Priority: Important security fixes
- MEDIUM Priority: Recommended improvements
- LOW Priority: Best practice enhancements
- Action description
- Implementation guidance
Conclusion
Conclusion
Final assessment summary:
- Overall security posture evaluation
- Prioritization guidance
- Regular assessment recommendations
- Important validation notes
Legal Disclaimer
Legal Disclaimer
Standard legal protections:
- Educational/authorized use statement
- Liability disclaimers
- Ethical use requirements
Report Generation
Automatic Generation
Reports are automatically generated after each scan:Report Location
All reports are saved to thereports/ directory with the naming convention:
AutoPentestX_Report_192_168_1_100_20251130_143220.pdf
Customization
Custom Tester Name
Modify the report generator inmodules/pdf_report.py:pdf_report.py:453:
Custom Styling
The PDF uses custom styles defined increate_custom_styles() at modules/pdf_report.py:36-92:
- CustomTitle: 24pt Helvetica-Bold, centered
- SectionHeading: 16pt Helvetica-Bold
- Risk Styles: Color-coded by severity
- CriticalRisk: Red
- HighRisk: Orange-red
- MediumRisk: Orange
- LowRisk: Blue
Risk Level Colors
The report uses a consistent color scheme for risk visualization:| Risk Level | Color | Usage |
|---|---|---|
| CRITICAL | Red | Immediate action required |
| HIGH | Orange-red | Priority remediation |
| MEDIUM | Orange | Recommended fixes |
| LOW | Blue | Best practices |
| MINIMAL | Green | Informational |
| UNKNOWN | Grey | Unable to determine |
Color-coding is applied throughout the report in executive summaries, vulnerability tables, and risk assessment sections.
Report Sections API
Individual Section Generation
You can generate specific report sections programmatically:File Size Considerations
Typical report sizes range from 150-500 KB depending on:
- Number of vulnerabilities discovered
- Port count
- CVE entries
- Recommendation length
Best Practices
- Review Before Distribution: Always review generated reports for accuracy
- Secure Storage: Store reports in encrypted locations with restricted access
- Version Control: Use scan IDs to correlate reports with database entries
- Timely Delivery: Generate and deliver reports promptly after assessments
- Confidentiality: Respect the CONFIDENTIAL markings on all reports
Troubleshooting
Report Generation Fails
If PDF generation encounters errors:- Ensure the
reports/directory exists and is writable - Verify ReportLab is installed:
pip3 install reportlab - Check for sufficient disk space
- Review traceback output for specific errors
Missing Data in Report
If sections appear empty:- Verify scan completed successfully
- Check that data structures are properly formatted
- Ensure all required parameters are passed to
generate_report()
Related Resources
- Database Queries - Query scan data for custom reports
- Log Files - Debugging report generation issues
- Risk Assessment - Understanding risk calculation