Overview
The/agentic command runs RAPTOR’s fully autonomous security testing workflow. It combines scanning, validation, analysis, exploit generation, and patch generation into a single end-to-end pipeline.
This is RAPTOR’s most powerful command. It autonomously performs the entire security research workflow without manual intervention.
Syntax
Parameters
Absolute path to the code repository to analyze
Maximum number of findings to process (default: unlimited)
Skip Phase 2 exploitability validation (not recommended)
Skip exploit generation (patch generation only)
Skip patch generation (exploit generation only)
Use existing SARIF file instead of running new scan
Workflow Phases
The agentic workflow executes these phases automatically:Phase 1: Scanning
- Runs Semgrep and CodeQL static analysis
- Generates SARIF files with findings
- Deduplicates identical vulnerabilities
Phase 2: Validation (NEW)
Phase 2 validation is automatically enabled in agentic mode. It filters out false positives before expensive exploit generation.
- Validates that findings are real and reachable
- Checks exploitability constraints
- Filters out test code and dead code
- See
/validatecommand for details
Phase 3: Analysis
- LLM-based deep analysis of each finding
- Adversarial thinking and attack surface mapping
- Exploitability assessment
- Root cause identification
Phase 4: Exploit Generation
- Generates proof-of-concept exploit code
- Creates working exploits in Python, C, or pwntools
- Validates exploitability constraints
- Saved to
out/*/exploits/
Phase 5: Patch Generation
- Generates secure patches for each vulnerability
- Provides fix recommendations
- Creates patch files ready to apply
- Saved to
out/*/patches/
Examples
Full Autonomous Workflow
Limited Findings
Exploit Generation Only
Patch Generation Only
Using Existing SARIF
Skip Validation (Not Recommended)
Output Structure
Use Cases
- Comprehensive security audits
- Automated vulnerability discovery and exploitation
- Security research and analysis
- Patch development
- Red team operations
- Bug bounty hunting
Safety Features
- Exploits are only generated in the output directory
- Patches are not automatically applied
- All changes require manual review and approval
- No destructive operations on source code
Performance Considerations
- Full workflow can take 30-60 minutes for large codebases
- Use
--max-findingsto limit processing time - Phase 2 validation adds 5-10 minutes but prevents wasted effort
- Skip validation only if you trust scanner output completely
Related Commands
/scan
Quick static analysis only
/validate
Standalone validation pipeline
/exploit
Exploit generation only
/patch
Patch generation only
Notes
- Phase 2 validation is enabled by default (use
--skip-validationto disable) - For defensive security research, education, and authorized penetration testing
- Review all generated exploits and patches before use
- Exploits are for educational and research purposes only