Skip to main content
Shannon has been tested against industry-standard intentionally vulnerable applications to demonstrate its capabilities. These sample reports showcase Shannon’s ability to discover, exploit, and document real security vulnerabilities.

Benchmark performance

Shannon Lite achieved a 96.15% success rate (100/104 exploits) on a systematically cleaned, hint-free version of the XBOW security benchmark, running in white-box (source-available) configuration.

Benchmark results

96.15% success rate on XBOW benchmark with detailed methodology

Vulnerability coverage

Complete coverage of OWASP vulnerability classes

Sample reports from vulnerable applications

These reports demonstrate Shannon’s ability to move beyond simple scanning, performing deep contextual exploitation with minimal false positives and actionable proof-of-concepts.

OWASP Juice Shop

20+ critical vulnerabilities including complete auth bypass and database exfiltration

c{api}tal API

Nearly 15 critical vulnerabilities leading to full application compromise

OWASP crAPI

Over 15 critical vulnerabilities with advanced JWT attacks and SSRF exploitation

Report structure

Every Shannon report follows a consistent structure designed for actionable security assessment:
1

Executive summary

High-level overview of findings by vulnerability type with overall risk assessment
2

Network reconnaissance

Open ports, services, security misconfigurations, and SSL/TLS analysis
3

Vulnerability exploitation evidence

Detailed proof-of-concept exploits for each confirmed vulnerability:
  • Vulnerable location (endpoint, parameter, code reference)
  • Impact assessment and severity rating
  • Step-by-step exploitation procedure
  • Actual exploit payloads and responses
  • Proof of impact with concrete evidence
4

Technical notes

Code-level analysis referencing specific files and line numbers from source review

Key report features

Proof-by-exploitation

Every reported vulnerability includes a working proof-of-concept. No exploit = no report.

Copy-paste PoCs

All exploits include ready-to-run curl commands and code examples

Code references

Vulnerabilities link to specific source files and line numbers

Zero false positives

Only exploitable vulnerabilities are reported - theoretical risks are excluded

Report metrics

Each Shannon report includes:
  • Target information: Application name, URL, assessment date, scope
  • Vulnerability summary: Organized by OWASP category
  • Network reconnaissance: Infrastructure analysis from nmap, subfinder, whatweb
  • Exploitation evidence: Detailed PoC for each vulnerability
  • Severity ratings: Critical, High, Medium, Low classifications
  • Impact assessment: Business impact and risk analysis
  • Remediation guidance: Code-level fix recommendations
Based on testing against OWASP Juice Shop, ctal, and crAPI:
  • Time: Approximately 1 to 1.5 hours per full assessment
  • Cost: Approximately $50 USD using Claude 4.5 Sonnet (varies by application complexity)
  • Coverage: 5 parallel vulnerability analysis agents + 5 parallel exploitation agents

Next steps

Run your first pentest

Get started with Shannon in under 10 minutes

View detailed results

Explore the complete OWASP Juice Shop report

Build docs developers (and LLMs) love