Prerequisites
Before you begin, ensure you have:- Docker installed and running (Install Docker)
- An Anthropic API key from the Anthropic Console
Shannon uses Claude models for autonomous security analysis. You’ll need an active Anthropic API key to run pentests.
Three Steps to Your First Pentest
Prepare Your Repository
Shannon analyzes source code to guide its attacks. Place your target repository in the
./repos/ directory:The
REPO parameter refers to a folder name inside ./repos/, not an absolute path.Monitoring Your Pentest
Shannon runs in the background. Use these commands to monitor progress:Shannon typically completes a full pentest in 1 to 1.5 hours, depending on application complexity. You can safely close your terminal — the workflow continues in Docker.
Getting Your Results
When the pentest completes, find your comprehensive security report:- Verified vulnerabilities only — Shannon’s “No Exploit, No Report” policy eliminates false positives
- Reproducible exploits — Copy-and-paste Proof-of-Concepts you can run immediately
- Source code references — Exact file and line numbers for each vulnerability
- Impact analysis — Real-world damage potential of each finding
Advanced Options
Customize your pentest with additional parameters:What Happens During a Pentest?
Shannon executes a multi-phase workflow:- Pre-Reconnaissance — External scans with nmap, subfinder, whatweb + source code analysis
- Reconnaissance — Attack surface mapping and entry point discovery
- Vulnerability Analysis — 5 parallel agents hunt for injection, XSS, SSRF, auth flaws, authorization issues
- Exploitation — Real browser-based attacks to prove vulnerabilities are exploitable
- Reporting — Professional security report with only verified, reproducible findings
Phases 3 and 4 run in parallel for maximum speed. Shannon uses intelligent retry logic to handle API rate limits automatically.
Stopping Shannon
When you’re done, stop the containers:Next Steps
Installation Guide
Detailed installation for Windows, macOS, and Linux
Configuration
Set up authentication, 2FA, and testing rules
CLI Reference
Explore all available commands and options
Sample Reports
See real pentest results from Shannon
Need help? Join our Discord community or check troubleshooting for common issues.
