Overview
Scan modes control the testing strategy, agent parallelization, and time investment. Fromesprit/llm/config.py:14, modes are configured at scan initialization.
Quick
Surface-level scan (~5 min)High-impact vulns only
Standard
Balanced coverage (~15 min)Systematic methodology
Deep
Comprehensive (~30+ min)Exhaustive analysis
Setting Scan Mode
Specify the mode with the--scan-mode or -m flag:
Default mode is
deep - if no mode is specified, Esprit runs a comprehensive deep scan.Quick Mode
Time-boxed rapid assessment targeting high-impact vulnerabilities. Based onesprit/skills/scan_modes/quick.md.
When to Use Quick Mode
- CI/CD Pipeline - Fast security checks on every commit
- Bug Bounty Recon - Initial triage of multiple targets
- Time-Constrained - Limited time for testing
- High-Priority Only - Focus on critical issues
Testing Strategy
- Phase 1: Rapid Orientation
- Phase 2: High-Impact Targets
- Phase 3: Validation
Whitebox (source available)
- Focus on recent changes (git diffs, new commits)
- Identify security-sensitive patterns in changed code
- Trace user input through modified code paths
- Check if security controls were modified
- Map authentication and critical user flows
- Identify exposed endpoints and entry points
- Skip deep content discovery
Agent Parallelization
Quick mode creates 2-3 parallel subagents after orientation:Quick mode philosophy: Running 3 agents for 5 min each > running 1 agent for 15 min sequentially. Always prefer parallel execution.
Resource Usage
Fromesprit/llm/cost_estimator.py:14-18:
Standard Mode
Balanced security assessment with systematic methodology and full attack surface coverage. Based onesprit/skills/scan_modes/standard.md.
When to Use Standard Mode
- Production Pre-Release - Thorough testing before deployment
- Quarterly Audits - Regular security assessments
- Third-Party Apps - Vendor security evaluation
- Bug Bounty Hunting - Comprehensive coverage without exhaustive depth
Testing Strategy
- Phase 1: Reconnaissance
- Phase 2: Business Logic
- Phase 3: Systematic Testing
- Phase 4: Exploitation
Whitebox
- Map codebase structure: modules, entry points, routing
- Identify architecture pattern (MVC, microservices, monolith)
- Trace input vectors: forms, APIs, file uploads, headers
- Review authentication and authorization flows
- Analyze database interactions and ORM usage
- Check dependencies for known CVEs
- Crawl application thoroughly
- Enumerate endpoints, parameters, and functionality
- Fingerprint technology stack
- Map user roles and access levels
- Capture traffic with proxy
Agent Parallelization
MANDATORY PARALLELIZATION - Standard mode creates 3-5 parallel subagents:Resource Usage
Fromesprit/llm/cost_estimator.py:19-23:
Deep Mode
Exhaustive security assessment with maximum coverage, depth, and vulnerability chaining. Based onesprit/skills/scan_modes/deep.md.
When to Use Deep Mode
- Critical Applications - Banking, healthcare, infrastructure
- Pre-IPO Security Audit - Comprehensive due diligence
- Advanced Persistent Testing - Finding what others miss
- Red Team Engagement - Maximum depth and creativity
Testing Strategy
- Phase 1: Exhaustive Recon
- Phase 2: Business Logic Deep Dive
- Phase 3: Comprehensive Testing
- Phase 4: Vulnerability Chaining
- Phase 5: Persistent Testing
Whitebox
- Map every file, module, and code path
- Trace all entry points from HTTP handlers to database queries
- Document all authentication mechanisms
- Map authorization checks and access control model
- Identify all external service integrations
- Analyze configuration for secrets and misconfigurations
- Review database schemas and data relationships
- Map background jobs, cron tasks, async processing
- Identify all serialization/deserialization points
- Review file handling: upload, download, processing
- Check all dependency versions against CVE databases
- Exhaustive subdomain enumeration with multiple sources
- Full port scanning across all services
- Complete content discovery with multiple wordlists
- Technology fingerprinting on all assets
- API discovery via docs, JavaScript analysis, fuzzing
- Identify all parameters including hidden ones
- Map all user roles with different account types
- Document rate limiting, WAF rules, security controls
Agent Parallelization
Deep mode decomposes the application hierarchically:Deep mode philosophy: Relentless. Creative. Patient. Thorough. Persistent. This is about finding what others miss.
Resource Usage
Fromesprit/llm/cost_estimator.py:24-28:
Reasoning Effort
Fromesprit/llm/llm.py:184-187, scan modes also affect the LLM reasoning effort:
Mode Comparison
| Feature | Quick | Standard | Deep |
|---|---|---|---|
| Duration | ~5 min | ~15 min | ~30+ min |
| Agent Count | 2-3 | 3-5 | 10+ |
| Coverage | High-impact only | Full attack surface | Exhaustive |
| Depth | Surface-level | Systematic | Comprehensive |
| Chaining | Single pivot | Multi-step paths | Complex chains |
| Reasoning | Medium | High | High |
| Input Tokens | ~100K | ~400K | ~1.2M |
| Output Tokens | ~30K | ~120K | ~350K |
| Cost Range | 0.50 | 2.00 | 6.00 |
| Best For | CI/CD, Triage | Production testing | Critical systems |
Terminal Output
Scan mode is displayed in the startup panel:Best Practices
Choose the right mode for your use case
Choose the right mode for your use case
- Quick for fast feedback loops (CI/CD, bug bounty recon)
- Standard for regular security testing (pre-release, audits)
- Deep for critical applications (banking, healthcare, infrastructure)
Cost optimization
Cost optimization
- Start with quick mode to identify low-hanging fruit
- Use standard mode for production environments
- Reserve deep mode for critical systems
- Monitor token usage with real-time stats
Whitebox vs Blackbox
Whitebox vs Blackbox
- Whitebox (repository/local code): Deep mode provides maximum value
- Blackbox (web URLs): Standard mode often sufficient
- Mixed targets: Use different modes per target
Combining with custom instructions
Combining with custom instructions
- Use
--instructionto focus deep mode on specific areas - Override default priorities with custom guidance
- Example: “Focus on authentication and authorization only”
Next Steps
Custom Instructions
Guide scans with custom testing instructions
Non-Interactive Mode
Integrate Esprit into CI/CD pipelines