Production Environment Warning
Intended Environments
Shannon is intended exclusively for use on:- Sandboxed environments
- Staging environments
- Local development environments
- Test environments where data integrity is not a concern
Potential Mutative Effects
Shannon’s exploitation agents can cause the following effects:- Creating new users or accounts
- Modifying existing data
- Deleting data
- Compromising test accounts
- Triggering unintended side effects from injection attacks
- Executing commands on the target system
- Making unauthorized API calls
Legal and Ethical Use
Shannon is designed for legitimate security auditing purposes only. Unauthorized scanning and exploitation of systems you do not own is illegal and can be prosecuted under laws such as:- Computer Fraud and Abuse Act (CFAA) in the United States
- Computer Misuse Act in the United Kingdom
- Similar cybercrime laws in other jurisdictions
LLM and Automation Limitations
Verification Required
While Shannon employs a “proof-by-exploitation” methodology to eliminate false positives, the underlying LLMs can still generate hallucinated or weakly-supported content in the final report.
- Validate the legitimacy of reported findings
- Verify the severity classifications
- Confirm the exploitability claims
- Review the proof-of-concept evidence
Comprehensiveness
Shannon Lite’s analysis may not be exhaustive due to:- Inherent limitations of LLM context windows
- Time constraints on agent execution
- Complexity of the target application
Scope of Analysis
Targeted Vulnerabilities
Shannon Lite specifically targets the following classes of exploitable vulnerabilities:- Broken Authentication - Login bypass, session hijacking, weak credentials
- Broken Authorization - Privilege escalation, IDOR, missing access controls
- Injection - SQL injection, command injection, LDAP injection
- Cross-Site Scripting (XSS) - Stored, reflected, and DOM-based XSS
- Server-Side Request Forgery (SSRF) - Internal service access, cloud metadata exploitation
What Shannon Lite Does Not Cover
This list is not exhaustive of all potential security risks. Shannon Lite’s “proof-by-exploitation” model means it will not report on issues it cannot actively exploit, such as:- Vulnerable third-party libraries or dependencies
- Insecure configurations (weak cipher suites, missing headers)
- Business logic flaws without clear exploitation vectors
- Denial of service vulnerabilities
- Information disclosure without exploitable impact
- Client-side security issues
Cost and Performance
Time Requirements
A full Shannon Lite test run typically takes 1 to 1.5 hours to complete.
- Application complexity
- Number of endpoints and features
- Authentication complexity
- API rate limits
- Number of vulnerability findings
API Costs
Costs vary based on:- Model pricing (Anthropic API rates)
- Application complexity
- Number of agents executed
- Length of analysis and exploitation phases
Cost Optimization
To manage costs:- Use
PIPELINE_TESTING=truefor faster, cheaper test runs during development - Configure
max_concurrent_pipelinesto reduce burst API usage - Resume failed runs using workspaces instead of restarting from scratch
- Use AWS Bedrock or Google Vertex AI for potentially different pricing models
White-Box Testing Only
Shannon Lite is designed for white-box (source-available) application security testing.
- Access to your application’s source code
- Access to the repository layout
- Ability to analyze code structure and dependencies
Other Considerations
Model Dependency
Shannon is built on top of the Anthropic Agent SDK and is optimized for Anthropic Claude models. While experimental support exists for alternative providers via router mode, output quality depends heavily on the model used.Network Requirements
Shannon requires:- Internet access for API calls to Anthropic (or alternative providers)
- Network access to the target application
- Docker networking properly configured
Resource Requirements
Shannon requires:- Docker installed and running
- Sufficient disk space for audit logs and deliverables
- Memory for multiple concurrent Docker containers
- CPU resources for parallel agent execution
Responsibility and Liability
This includes:- Obtaining proper authorization before testing
- Ensuring testing is performed in appropriate environments
- Validating and verifying all findings
- Handling discovered vulnerabilities responsibly
- Complying with all applicable laws and regulations