Output Directory Structure
All results are saved to./audit-logs/{hostname}_{sessionId}/ by default (customize with the OUTPUT parameter):
Key Files
comprehensive_security_assessment_report.md
comprehensive_security_assessment_report.md
The primary deliverable — a pentester-grade security report containing:
- Executive Summary: High-level overview of findings and risk assessment
- Vulnerability Details: Each finding includes:
- Severity rating (Critical, High, Medium, Low)
- OWASP category classification
- Technical description of the vulnerability
- Proof-of-Concept: Copy-and-paste exploits to reproduce the issue
- Impact analysis
- Remediation guidance
- Attack Surface Analysis: Insights from reconnaissance phase
- Testing Methodology: Overview of techniques used
session.json
session.json
Contains session metadata and metrics:Use this to track costs, time per phase, and identify performance bottlenecks.
agents/ Directory
agents/ Directory
Contains detailed logs for each agent’s execution:
- Real-time output from the AI agents
- Tool invocations (browser automation, command execution)
- Decision-making process and reasoning
- Error messages and retry attempts
- Understanding why certain vulnerabilities were flagged
- Debugging failed or incomplete runs
- Auditing the testing methodology
prompts/ Directory
prompts/ Directory
Snapshots of the exact prompts sent to each agent, including:
- Base prompt template
- Injected context (config, reconnaissance data)
- Variable substitutions
Understanding Vulnerability Severity
Shannon classifies findings by severity based on exploitability and impact:| Severity | Description | Example |
|---|---|---|
| Critical | Complete system compromise or data breach | Authentication bypass, SQL injection with full database access |
| High | Significant security impact with straightforward exploitation | IDOR allowing access to sensitive user data, SSRF to internal services |
| Medium | Limited impact or requires additional conditions to exploit | Reflected XSS on non-sensitive pages, authentication flaws with mitigating factors |
| Low | Minimal direct impact but indicates security weaknesses | Information disclosure, weak configurations |
Shannon Lite focuses on exploitable vulnerabilities only. It will not report on theoretical issues, vulnerable dependencies, or misconfigurations that couldn’t be actively exploited during testing.
Reading Proof-of-Concepts
Every vulnerability in the report includes a copy-and-paste Proof-of-Concept (PoC) demonstrating the exploit:Example: SQL Injection PoC
Example: Browser-Based XSS PoC
- Exact HTTP requests or browser actions
- Expected responses
- Confirmation of successful exploitation
- Impact demonstration
Interpreting Session Metrics
Thesession.json file provides insights into the pentest run:
Cost Analysis
Time Analysis
What Shannon Does NOT Report
Due to its “proof-by-exploitation” methodology, Shannon Lite will not report:- Vulnerable dependencies: Outdated libraries that weren’t actively exploited
- Theoretical vulnerabilities: Issues that couldn’t be proven through exploitation
- Configuration weaknesses: Insecure settings that didn’t lead to exploitable flaws
- Code quality issues: Non-security related bugs or anti-patterns
- Compliance gaps: Regulatory requirements not related to exploitable vulnerabilities
Common Report Patterns
High-Confidence Findings
When Shannon reports a vulnerability, it includes:- Source code reference: Exact file and line number of the vulnerable code
- Exploitation proof: Successful execution of the attack
- Impact demonstration: Evidence of what was compromised
- Remediation guidance: Specific code changes to fix the issue
No False Positives
If an attack hypothesis couldn’t be exploited, it’s discarded. The report only includes vulnerabilities that Shannon successfully exploited.Defense Validation
Shannon will explicitly note when defenses are working correctly:“The application implements proper XSS defenses with context-aware output encoding. All attempted XSS payloads were successfully sanitized. No exploitable XSS vulnerabilities were found.”This confirms that certain attack vectors are properly secured.
Validating Findings
While Shannon’s methodology minimizes false positives, human validation is essential:- Review the PoC: Execute the provided exploit in a safe environment
- Check the source code: Examine the referenced files and line numbers
- Assess impact: Verify the claimed impact matches your threat model
- Consider context: Some findings may be acceptable risk based on your security posture
Next Steps
After reviewing your report:- Prioritize remediation based on severity and business impact
- Track fixes by re-running Shannon against the same workspace after code changes
- Integrate into CI/CD for continuous security validation (Shannon Pro feature)
- Review agent logs if you need deeper context on any finding
agents/ directory or join our Discord community.