Shannon currently targets classes of exploitable vulnerabilities. Issues that cannot be actively exploited (such as vulnerable third-party libraries, weak encryption algorithms, or insecure configurations) are not included in reports.
Coverage philosophy
No exploit, no report
Every vulnerability must be successfully exploited to be reported - eliminates false positives
Code-aware testing
White-box analysis combines source code review with dynamic exploitation
OWASP-aligned
Coverage maps to OWASP Web Security Testing Guide (WSTG) controls
Pentester-grade output
Reports include working PoCs, code references, and impact analysis
Current vulnerability coverage
Shannon currently targets five major vulnerability classes:1. Broken authentication
Authentication vulnerabilities covered
Authentication vulnerabilities covered
- Authentication bypass: SQL injection, NoSQL injection, logic flaws
- Weak authentication: Default credentials, weak passwords, no lockout
- Multi-factor authentication: TOTP bypass, backup code abuse
- Session management: Fixation, hijacking, weak tokens
- JWT attacks: Algorithm confusion, alg:none, weak signatures, kid injection
- Password reset: Account enumeration, token prediction, bypass
- Credential transport: Unencrypted channels, weak TLS
2. Broken authorization
Authorization vulnerabilities covered
Authorization vulnerabilities covered
3. Injection attacks
Injection vulnerabilities covered
Injection vulnerabilities covered
- SQL injection: Union-based, boolean-based blind, time-based blind, error-based
- NoSQL injection: MongoDB operator injection, JSON injection
- Command injection: OS command execution, shell metacharacter abuse
- Code injection: eval() exploitation, unsafe deserialization
- Server-Side Template Injection (SSTI): Jinja2, Twig, Handlebars, etc.
- XXE (XML External Entity): File disclosure, SSRF via XXE
- YAML injection: Unsafe deserialization
4. Cross-site scripting (XSS)
XSS vulnerabilities covered
XSS vulnerabilities covered
- Reflected XSS: Parameter-based, header-based, URL-based
- Stored XSS: Database-stored, file-stored, log injection
- DOM-based XSS: Client-side template injection, unsafe sinks
- XSS filter bypass: Encoding, obfuscation, polyglot payloads
- JSONP callback XSS: Unvalidated callbacks
- Framework bypasses: Angular, React, Vue sanitization bypass
5. Server-Side Request Forgery (SSRF)
SSRF vulnerabilities covered
SSRF vulnerabilities covered
- Internal service access: Redis, databases, admin panels
- Cloud metadata: AWS, GCP, Azure instance metadata
- Protocol bypass: file://, gopher://, dict://
- Network scanning: Port enumeration, service fingerprinting
- DNS rebinding: Time-of-check/time-of-use
- SSRF to RCE: Exploiting internal services
WSTG checklist coverage
Shannon’s coverage aligns with the OWASP Web Security Testing Guide (WSTG). See the detailed WSTG checklist for complete mapping.Information gathering
8/10 WSTG-INFO controls covered
Authentication
9/11 WSTG-ATHN controls covered
Authorization
5/5 WSTG-ATHZ controls covered
Session management
8/11 WSTG-SESS controls covered
Input validation
10/20 WSTG-INPV controls covered
API testing
3/3 WSTG-APIT controls covered
What Shannon does not cover
Shannon focuses on dynamic exploitation. The following areas require static analysis and are planned for future products:Integrated security tools
Shannon enhances its analysis by leveraging industry-standard security tools:Nmap - Network reconnaissance
Nmap - Network reconnaissance
- Port scanning and service enumeration
- Version detection for exposed services
- OS fingerprinting
- SSL/TLS configuration analysis
Subfinder - Subdomain enumeration
Subfinder - Subdomain enumeration
- Passive subdomain discovery
- DNS record enumeration
- Subdomain takeover detection
WhatWeb - Web technology fingerprinting
WhatWeb - Web technology fingerprinting
- Framework and CMS detection
- Server software identification
- JavaScript library enumeration
- Known vulnerability matching
Schemathesis - API fuzzing
Schemathesis - API fuzzing
- OpenAPI/Swagger specification testing
- Automated API endpoint discovery
- Schema validation bypass detection
- Input fuzzing and edge case testing
Playwright - Browser automation
Playwright - Browser automation
- Automated login workflows
- Dynamic page interaction
- XSS payload execution
- CSRF token handling
- Screenshot capture for evidence
Performance metrics
XBOW benchmark
96.15% success rate (100/104 exploits) on hint-free source-aware variant
Real-world testing
20+ vulnerabilities in OWASP Juice Shop, 15 in ctal, 15+ in crAPI
Runtime
1-1.5 hours per complete assessment
Cost
~$50 USD per full pentest using Claude 4.5 Sonnet
Future coverage expansion
Shannon’s roadmap includes expanding coverage to additional vulnerability classes:Phase 1: Enhanced injection detection
- LDAP injection
- XML injection
- XPath injection
- Format string vulnerabilities
Phase 2: Advanced client-side attacks
- Clickjacking and UI redressing
- CORS misconfiguration exploitation
- WebSocket injection
- PostMessage vulnerabilities
Phase 3: Business logic testing
- Race conditions
- Workflow bypass
- Payment manipulation
- Resource limit bypass
Related resources
Vulnerability types
Detailed breakdown of each vulnerability class with WSTG mapping
Benchmark results
96.15% success rate on XBOW benchmark with full analysis
Sample reports
Real penetration testing results from Juice Shop, ctal, and crAPI
Run your first pentest
Get started with Shannon in under 10 minutes