start command launches a new AI-powered penetration testing workflow against a target URL with access to the source code repository.
Basic Usage
Target URL to test (e.g.,
https://example.com or http://localhost:3000)- Must include protocol (
http://orhttps://) - Can be external URLs or local applications
- For Docker-hosted local apps, use
host.docker.internalinstead oflocalhost
Repository folder name under
./repos/- Must be a folder name, not an absolute path
- Repository must exist at
./repos/<repo-name>/ - Clone or symlink your repository before running
Configuration Options
Workflow Configuration
Path to YAML configuration file
- Defines authentication settings (credentials, MFA, TOTP)
- Configures testing scope and exclusions
- Sets agent-specific parameters
- See YAML Configuration for details
Custom output directory for reports and audit logs
- Directory will be created if it doesn’t exist
- Permissions automatically set for container access (chmod 777)
- Workflow logs saved to
<OUTPUT>/<workspace-id>/workflow.log - Audit data saved to
<OUTPUT>/<workspace-id>/
Named workspace for resume capability
- Auto-resumes if workspace exists
- Creates new workspace if name is new
- Skips already-completed agents on resume
- Validates deliverables before resuming
- See Workspaces & Resume for details
Development Options
Enable fast testing mode with minimal prompts
- Uses shorter prompts optimized for speed
- Reduces retry intervals (10s initial, 30s max)
- Fewer maximum retry attempts (5 vs 50)
- Ideal for development and CI testing
Force Docker rebuild without cache
- Useful when code changes aren’t being picked up
- Rebuilds worker container from scratch
- Takes longer but ensures latest code
Multi-Model Support
Enable multi-model routing via claude-code-routerSee Router Mode for configuration details.
- Routes requests through claude-code-router
- Supports OpenAI, OpenRouter, and other providers
- Requires
OPENAI_API_KEYorOPENROUTER_API_KEYin.env - Automatically starts router container
- Sets
ANTHROPIC_BASE_URL=http://router:3456
Authentication Methods
Shannon supports multiple authentication providers:Anthropic API (Default)
Claude OAuth Token
AWS Bedrock
Google Vertex AI
Router with Alternative Providers
Examples
Basic Pentest
Production Audit
Local Development
Resume Workflow
Multi-Model Routing
Workflow Phases
Once started, Shannon executes a five-phase pipeline:- Pre-Reconnaissance - External scans (nmap, subfinder, whatweb) + code analysis
- Reconnaissance - Attack surface mapping from initial findings
- Vulnerability Analysis - 5 parallel agents analyzing:
- SQL/NoSQL/Command injection
- Cross-site scripting (XSS)
- Authentication flaws
- Authorization bypasses
- Server-side request forgery (SSRF)
- Exploitation - Conditional parallel exploitation of confirmed vulnerabilities
- Reporting - Executive-level security assessment report
Monitoring Progress
Real-time Logs
Temporal Web UI
Open http://localhost:8233 to:- View workflow execution history
- Query progress via
getProgress - Inspect activity logs and errors
- See retry attempts and backoff
- Monitor parallel agent execution
Workspace Status
Output Structure
After completion, Shannon generates:Error Handling
Shannon includes intelligent retry logic:- Transient errors: Automatic retry with exponential backoff
- Rate limits: Extended backoff (up to 6 hours for subscriptions)
- Billing errors: Patient retry (5min intervals, up to 30min)
- Non-retryable: Authentication, permission, invalid requests
Next Steps
View Logs
Monitor workflow execution in real-time
Workspaces
List and manage workspaces
Configuration
Advanced YAML configuration options
Troubleshooting
Common issues and solutions
