Agent Registry
All agents are defined insrc/session-manager.ts:14 as the single source of truth:
- Name — Unique identifier (e.g.,
injection-vuln) - Display Name — Human-readable label
- Prerequisites — Which agents must complete first
- Prompt Template — Located in
prompts/ - Deliverable Filename — Output artifact for validation
- Model Tier — Small/Medium/Large for cost optimization
Phase 1: Reconnaissance Agents
Pre-Recon Agent
Agent identifier
Human-readable name
Uses Claude Opus for deep reasoning
Template:
prompts/pre-recon-code.txtExternal Scanning
- Nmap port scanning
- Subfinder subdomain enumeration
- WhatWeb technology fingerprinting
- Schemathesis API schema analysis
Static Analysis
- File structure analysis
- Technology stack detection
- Entry point discovery
- Data flow identification
code_analysis_deliverable.md
Validator: Checks for deliverable file existence at src/session-manager.ts:186
MCP Assignment: playwright-agent1 (minimal browser use)
Recon Agent
Agent identifier
Requires pre-recon completion
Uses Claude Sonnet (default tier)
Template:
prompts/recon.txt- Authentication
- Exploration
- Correlation
- Form-based login with TOTP support
- SSO/OAuth flows (Google, GitHub, etc.)
- API token authentication
- HTTP Basic Authentication
prompts/shared/login-instructions.txt template.recon_deliverable.md
Validator: src/session-manager.ts:192
MCP Assignment: playwright-agent2 (heavy browser automation)
Phase 2: Vulnerability Analysis Agents
All 5 vuln agents run in parallel with configurable concurrency.Injection Vuln Agent
Identifies SQL/NoSQL/Command injection vulnerabilities
Requires reconnaissance data
Template:
prompts/vuln-injection.txt- SQL Injection (SQLi)
- NoSQL Injection
- Command Injection (OS Command Injection)
- LDAP Injection
- XML Injection (XXE)
- Template Injection (SSTI)
Sink Detection
Locate dangerous operations:
db.query(),db.raw()(SQL)exec(),spawn(),eval()(Command)- Template rendering functions
Data Flow Tracing
Track input through:
- Variable assignments
- Function parameters
- Sanitization/validation functions
injection_analysis_deliverable.md— Analysis reportinjection_queue.json— Exploitation queue for Phase 4
createVulnValidator('injection') at src/session-manager.ts:198
MCP Assignment: playwright-agent1
XSS Vuln Agent
Identifies Cross-Site Scripting vulnerabilities
- Reflected XSS
- Stored XSS
- DOM-based XSS
- mXSS (Mutation XSS)
- User input rendered in HTML/JavaScript contexts
- Insufficient output encoding/escaping
- DOM manipulation with
innerHTML,outerHTML - JavaScript template literals with user data
- Content-Security-Policy bypasses
xss_analysis_deliverable.mdxss_queue.json
createVulnValidator('xss') at src/session-manager.ts:199
MCP Assignment: playwright-agent2
Auth Vuln Agent
Identifies Broken Authentication vulnerabilities
- Authentication bypass
- Weak password policies
- JWT vulnerabilities (alg:none, weak keys, kid injection)
- Session fixation
- Credential stuffing vectors
- MFA/2FA bypass
- Password reset flaws
- Login endpoint logic
- JWT generation and validation
- Session token management
- Password reset workflows
- OAuth/SSO implementation flaws
auth_analysis_deliverable.mdauth_queue.json
createVulnValidator('auth') at src/session-manager.ts:200
MCP Assignment: playwright-agent3
SSRF Vuln Agent
Identifies Server-Side Request Forgery vulnerabilities
- Full SSRF (HTTP/HTTPS)
- Blind SSRF
- DNS SSRF
- File-based SSRF (
file://protocol) - Cloud metadata access (AWS, GCP, Azure)
- HTTP client usage (
axios,fetch,request) - URL parameters passed to HTTP libraries
- File read operations with user input
- DNS resolution with user-controlled hostnames
- Webhook/callback URL validation
ssrf_analysis_deliverable.mdssrf_queue.json
createVulnValidator('ssrf') at src/session-manager.ts:201
MCP Assignment: playwright-agent4
Authz Vuln Agent
Identifies Broken Authorization vulnerabilities
- IDOR (Insecure Direct Object Reference)
- Privilege escalation (horizontal and vertical)
- Missing function-level access control
- Mass assignment vulnerabilities
- Path traversal in authorization checks
- Resource access patterns (user ID in URL/body)
- Role/permission checking logic
- Admin vs. user endpoint separation
- Object ownership validation
- API endpoint authorization middleware
authz_analysis_deliverable.mdauthz_queue.json
createVulnValidator('authz') at src/session-manager.ts:202
MCP Assignment: playwright-agent5
Phase 3: Exploitation Agents
All 5 exploit agents run in parallel, pipelined with their corresponding vuln agents.Injection Exploit Agent
Exploits injection vulnerabilities from queue
Requires injection analysis completion
Template:
prompts/exploit-injection.txtSQL Injection
SQL Injection
- UNION-based extraction
- Boolean-based blind SQLi
- Time-based blind SQLi
- Error-based SQLi
- Stacked queries
Command Injection
Command Injection
- Command chaining (
;,&&,||) - Pipe operators (
|) - Backtick execution
- Subshell execution (
$())
NoSQL Injection
NoSQL Injection
- MongoDB operator injection (
$ne,$gt) - JavaScript injection in MongoDB
- Blind NoSQL extraction
injection_exploitation_evidence.md
Validator: createExploitValidator('injection') at src/session-manager.ts:205
MCP Assignment: playwright-agent1 (reuses vuln agent’s instance)
XSS Exploit Agent
Exploits XSS vulnerabilities from queue
- Reflected XSS
- Stored XSS
- DOM XSS
Execute payloads via URL parameters or form inputs:Verify execution in browser DOM using Playwright.
xss_exploitation_evidence.md
Validator: createExploitValidator('xss') at src/session-manager.ts:206
MCP Assignment: playwright-agent2
Auth Exploit Agent
Exploits authentication vulnerabilities from queue
JWT Attacks
- alg:none bypass: Remove signature validation
- Algorithm confusion: Switch RS256 to HS256
- Weak secret brute force: Dictionary attacks on HMAC keys
- kid injection: Path traversal in key ID parameter
auth_exploitation_evidence.md
Validator: createExploitValidator('auth') at src/session-manager.ts:207
MCP Assignment: playwright-agent3
SSRF Exploit Agent
Exploits SSRF vulnerabilities from queue
Cloud Metadata
Cloud Metadata
Access cloud provider metadata services:
Internal Network Scanning
Internal Network Scanning
Probe internal services:
File Protocol
File Protocol
Read local files:
ssrf_exploitation_evidence.md
Validator: createExploitValidator('ssrf') at src/session-manager.ts:208
MCP Assignment: playwright-agent4
Authz Exploit Agent
Exploits authorization vulnerabilities from queue
- IDOR
- Privilege Escalation
- Missing Access Control
Access other users’ resources:
authz_exploitation_evidence.md
Validator: createExploitValidator('authz') at src/session-manager.ts:209
MCP Assignment: playwright-agent5
Phase 4: Reporting Agent
Report Agent
Generates executive security report
Requires all 5 exploit agents:
['injection-exploit', 'xss-exploit', 'auth-exploit', 'ssrf-exploit', 'authz-exploit']Uses Claude Haiku (cost-optimized for summarization)
Template:
prompts/report-executive.txtArtifact Collection
Function:
assembleFinalReport() in src/services/reporting.tsGathers:- All 5 exploitation evidence files
- Reconnaissance deliverable
- Pre-recon code analysis
AI Refinement
The report agent adds:
- Executive summary
- Risk prioritization
- Remediation roadmap
- Removes hallucinated/false content
- Formats for readability
comprehensive_security_assessment_report.md
Validator: Checks for deliverable existence at src/session-manager.ts:212
MCP Assignment: playwright-agent3 (minimal browser use)
Agent Execution Lifecycle
Every agent follows the same lifecycle managed byAgentExecutionService (src/services/agent-execution.ts):
Prompt Loading
- Read template from
prompts/ - Substitute variables (URL, config, login instructions)
- Save snapshot to
prompts/{agent}.txtfor reproducibility
Execution
- Start agent via
claude-executor.ts - Heartbeat loop (2s intervals) to Temporal
- Stream logs to
agents/{agent}_{attempt}.json
Validation
- Run agent validator from
AGENT_VALIDATORS - Check deliverable existence and queue validation
- Retry up to 3 times on validation failure
Agent Dependencies (DAG)
Managed by:src/session-manager.ts:14 (prerequisites field)
Adding Custom Agents
To add a new vulnerability type:See the Custom Agents Guide for a complete walkthrough.
Next Steps
Pipeline Phases
Understand the 5-phase execution flow
Architecture
Explore the multi-agent system design
Workspaces
Learn about resume and git checkpointing
Prompts
Customize agent behavior via templates