Overview
PentAGI’s Reporter Agent automatically generates comprehensive security reports documenting all findings, vulnerabilities, and exploitation steps. Reports include detailed technical information, proof-of-concept examples, and remediation guidance.Automated Generation
AI-powered report creation from test results
Comprehensive Details
Complete vulnerability documentation with PoCs
Multiple Formats
Markdown, JSON, and structured outputs
Historical Tracking
Access past reports and track progress
Report Generation
Reporter Agent
The Reporter Agent is a specialized agent focused on creating professional security reports:- Executive summary
- Detailed vulnerability findings
- Step-by-step exploitation procedures
- Remediation recommendations
- Supporting evidence and screenshots
Report Tool Schema
Automatic Report Triggers
Reports are generated:- When a task is completed
- When vulnerabilities are discovered
- When user requests a report
- At scheduled intervals (configurable)
Report Structure
Report Components
A comprehensive PentAGI report includes:Executive Summary
Executive Summary
Overview of findings for management
- Test objectives and scope
- Overall risk assessment
- Number of vulnerabilities by severity
- Key recommendations
- Timeline of testing activities
Vulnerability Details
Vulnerability Details
Technical documentation for each findingFor each vulnerability:Steps to Reproduce:
- Title: Clear, descriptive name
- Severity: Critical/High/Medium/Low/Info
- CVSS Score: Common Vulnerability Scoring System rating
- CWE: Common Weakness Enumeration classification
- Description: Detailed explanation of the vulnerability
- Impact: Potential consequences of exploitation
- Affected Components: Systems, URLs, parameters
- Proof of Concept: Working exploit demonstration
- Steps to Reproduce: Detailed reproduction instructions
- Remediation: Specific fix recommendations
- References: Links to CVEs, advisories, documentation
- Navigate to https://target.com/login
- Enter username:
admin' OR '1'='1' -- - Enter any password
- Observe successful authentication bypass
- Use parameterized queries/prepared statements
- Implement input validation and sanitization
- Apply least privilege database permissions
- Add web application firewall rules
Supporting Evidence
Supporting Evidence
Visual proof of vulnerabilities
- Screenshots of successful exploits
- Network traffic captures
- Tool output logs
- Configuration files
- Database dumps (sanitized)
- Browser screenshots from browser tool
- Terminal output from security tools
- Network diagrams
- Data flow diagrams
- Timeline visualizations
Recommendations
Recommendations
Prioritized remediation guidance
- Immediate Actions (Critical/High)
- Short-term Fixes (Medium)
- Long-term Improvements (Low/Info)
- Security Best Practices
- Compliance Considerations
Appendices
Appendices
Supplementary information
- Full tool outputs
- Raw scan data
- Technical references
- Methodology documentation
- Testing scope and limitations
- Glossary of terms
Report Generation Process
Data Collection Flow
Reporter Prompt System
The Reporter Agent uses specialized prompts:reporter):
- Defines report structure and format
- Sets tone and style guidelines
- Specifies required sections
- Includes compliance requirements
task_reporter):
- Specific report request details
- Scope and objectives
- Target information
- Custom requirements
Report Message Types
Export Formats
Markdown Format
Default human-readable format:- Easy to read and edit
- Version control friendly
- Can be converted to PDF/HTML
- Supports code blocks and formatting
JSON Format
Structured data format for automation:- Machine-parsable
- Easy integration with other tools
- Supports complex data structures
- Can be queried and filtered
Database Storage
Reports are stored in PostgreSQL:Historical Reports
Accessing Past Reports
Retrieve historical reports through:-
Web Interface:
- Navigate to Reports section
- Filter by task, date, or severity
- View or download reports
-
GraphQL API:
-
Memory Search:
Report Analytics
Track report generation metrics:- Report generation time
- Number of findings per report
- Severity distribution
- Most common vulnerabilities
- Remediation tracking
Screenshot Integration
Browser Screenshots
Automatically captured during testing:Screenshot Storage
Screenshots are stored with metadata:- Name/description
- Source URL
- Task and subtask IDs
- Timestamp
- File path in storage
Including Screenshots in Reports
Reporter Agent automatically references screenshots:Report Customization
Custom Report Templates
Modify reporter prompts to customize output:Report Sections Configuration
Configure which sections to include:Best Practices
Report Quality
Report Quality
- Provide clear, actionable recommendations
- Include working proof-of-concept code
- Use screenshots to illustrate findings
- Rate vulnerabilities accurately (CVSS)
- Include references to CVEs and advisories
Evidence Collection
Evidence Collection
- Capture screenshots at key exploitation steps
- Save tool outputs as evidence
- Document all commands executed
- Store configuration files referenced
- Keep network traffic captures when relevant
Remediation Guidance
Remediation Guidance
- Provide specific, implementable fixes
- Prioritize by severity and business impact
- Include code examples for fixes
- Reference security best practices
- Consider compliance requirements
Report Organization
Report Organization
- Structure reports consistently
- Use clear section headings
- Include table of contents
- Add executive summary for management
- Separate technical details in appendices
Integration with Monitoring
Reports are tracked in observability systems:- Report generation requests
- Generation time and duration
- Report size and complexity
- LLM tokens used
- User interactions with reports
Related Resources
Autonomous Testing
Learn how AI agents discover vulnerabilities
Security Tools
Explore available pentesting tools
Monitoring
Track report generation metrics
API Reference
GraphQL API for report access