Vulnios PT — Penetration Testing as a Service

Authenticated active scans
with evidence the auditor will accept

OpenAPI-driven, ZAP Automation Framework under the hood, with an AI Pentester layer for the hard cases. Every finding ships with CWE, CVSS, payload, evidence, and EPSS + KEV exploitability priority. SARIF 2.1.0, 5-framework compliance mapping, and a sha256-anchored attestation certificate per run.

30 days · No card required · Authenticated full-active scans included

15 industry-standard engines, one unified schema

We don't reinvent scanners. We orchestrate them, parse their structured output, dedup with a deterministic signature, and enrich with AI + EPSS + KEV.

OWASP ZAP (AF)

DAST

Nuclei v3

Templates

Nikto

Web misconfig

Wapiti

Active scan

testssl.sh

TLS

sqlmap

SQL injection

Dastardly

CI-fast DAST

Nmap

Host discovery

httpx

HTTP probe

naabu

Port scan

subfinder

Subdomains

katana

Crawler

trufflehog

Secrets

Trivy

SBOM/CVE

graphql-cop

GraphQL

What you get

Everything an enterprise security review demands, with the surface a developer can actually use.

Authenticated active scans

OAuth-CC, bearer, basic, JWT, session-cookie, header. Auth profiles attach to targets — credentials live in Secret Manager and are injected at job start, never typed at run time.

OpenAPI + GraphQL spec-driven

Point us at /openapi.json or your GraphQL endpoint. ZAP AF requestor → activeScan tests every endpoint as authenticated. graphql-cop probes introspection + DOS.

AI Triage + Planner + Pentester

Gemini auto-enriches every finding with confidence + remediation. Claude tool-use loop runs interactive pentests with hard caps (12 turns, 200k tokens, $5/run, kill-switch).

Compliance + attestation

SARIF 2.1.0 for GitHub Code Scanning. OWASP Top-10, PCI-DSS 4.0, NIST 800-53, ISO 27001, SOC 2 mapping. Sha256-anchored attestation certificate downloadable per run.

Findings v2 schema

Every finding ships with CWE, WASC, plugin id, CVSS vector + score, attack payload, evidence ref, instances count, deterministic dedup signature. EPSS + CISA KEV priority on top.

Server-side scope guardrails

RFC1918, link-local, loopback, cloud-metadata (AWS+GCP+Azure) blocked at create + dispatch. DNS rebinding protection re-checks all resolved IPs. No accidental SSRF/internal scans.

Verify-fix workflow

One click re-runs a finding's exact tool + endpoint to confirm a fix landed. Child finding links back to parent so the timeline survives across sprints.

Real-time governance

Atomic dispatch quotas, retention sweeper with 30d grandfather window, per-tenant audit log (365d TTL), platform-admin tenant observation with audit trail.

IDOR + authz-matrix tester

Define roles × endpoints × expected access. We replay every request as every role and flag privilege escalations, IDOR / BOLA, and missing-auth gaps. Deterministic dedup, evidence-backed.

Submission Package

One ZIP per run: HTML + Markdown + XML + SARIF 2.1.0 + PDF + DOCX + attestation certificate + findings.json + manifest.json with checksums. Hand the ZIP to your auditor — no platform login required to verify.

Whitelabel reports

Upload your logo + brand colors once. HTML reports, attestation certificates, and submission packages render with your branding. MSP-ready: each downstream tenant gets their own brand pack.

How Vulnios PT compares

We're honest: at the autonomous-loop depth, XBOW + RunSybil are further along. We're broader, cheaper at the trial+starter end, and ship the operator workflow + compliance pack you actually need.

CapabilityVulnios PTXBOWPenteraDetectify
Self-serve trial30 days, no cardDemo onlySales contact14 days
AI Pentester (interactive)Claude tool-useYes (proprietary)LimitedNo
OpenAPI spec-drivenYesYesYesYes
SARIF export2.1.0 + GitHub CSYesYesYes
Verify-fix workflowBuilt-inYesYesManual
Compliance mapping5 frameworks332
Attestation certificatesha256-anchoredReport onlyReport onlyReport only
Per-finding EPSS + KEV priorityBuilt-inAdd-onAdd-onNo
Public REST API + webhooksBearer + HMACYesYesYes
Tenant-isolated multi-tenantYesYesYesYes
Pricing transparencyPublic tiersSales-ledSales-ledPublic

Comparison reflects publicly-documented capabilities as of 2026-05. Send a correction to hello@vulnios.com if anything looks off.

Frequently asked questions

How does authorization / scope verification work?
You verify ownership of every target via DNS TXT record or a file at /.well-known/vulnios-verify.txt. Server-side scope validator blocks RFC1918, cloud-metadata IPs, and DNS-rebinding attempts. An audit-logged self-attest fallback exists for environments where DNS/file isn't practical (Vercel previews, Heroku review apps).
What does the AI Pentester actually do?
It's a Claude tool-use loop with a strict allowlist (run_tool, read_finding, write_finding, request_auth_token — no shell, no eval). Each tool call is re-validated against PtPolicy.scopeRules server-side; scope violations fail hard and are not fed back to the model. Every turn is audit-logged to ptRuns/{id}/agentTurns/{n}. Caps: 12 turns, 200k input tokens, 30 min wall-clock, $5/run, and a per-tenant kill-switch flag.
Can I run this in my own infrastructure?
Today it's SaaS only, hosted on Google Cloud (GKE for the scan plane, Cloud Run for the AI agent, Firestore + GCS for state + artifacts). On-prem / self-hosted is on the roadmap behind enterprise demand — get in touch.
What happens to evidence and report data?
Request/response evidence is stored in GCS at gs://vulnios-pt-artifacts/findings/{findingId}/evidence.json with sensitive values redacted (Authorization, cookies, JWTs, AWS/Stripe/GitHub tokens, JSON api_key/password fields). Reports include the same redaction pass before export. Retention follows your plan tier; downgrades get a 30-day grandfather window before any sweep.
How is this different from running ZAP / nuclei myself?
You can absolutely run them yourself. We add: a unified findings schema across 11+ engines with deterministic dedup, AI triage on every finding, an authenticated active-scan path that injects credentials safely, compliance mapping, an attestation certificate with a sha256 fingerprint, server-side scope guardrails, atomic quota enforcement, and an admin governance plane. Single product surface vs gluing scripts.
Is there a free tier?
A 30-day free trial with no card required. Paid tiers from there; see /pricing for current bands. Enterprise tier is quote-driven and adds BYO Burp Pro, custom retention, an on-prem worker option, and audit-grade logging — contact sales.
What's in the Submission Package?
A single .zip per run containing: the full HTML report, the same report as Markdown + XML + PDF + DOCX, a SARIF 2.1.0 file for GitHub Code Scanning, the sha256-anchored attestation certificate (standalone HTML), raw findings as JSON, and a manifest.json with checksums for every file. Hand the ZIP to your auditor or upstream consumer — they can verify integrity without screen-sharing the platform.
Which compliance frameworks are mapped?
Five today: OWASP API Security Top-10 (2023) + OWASP Web Top-10, PCI-DSS 4.0 (Req 6.4.x, 11.3, 11.4), NIST 800-53 Rev 5 (RA-5, SI-2, CA-7), ISO 27001:2022 Annex A (8.8, 8.16, 8.29), and SOC 2 Trust Services Criteria (CC7.1, CC8.1). Each finding ships with the specific control IDs it touches; reports include a coverage matrix so you can wire findings directly to your audit workpapers.
How is the attestation certificate generated?
A standalone HTML document signed with sha256 over (run ID + canonical target list + complete findings hash + tool versions + run start/end timestamps). The certificate embeds its own hash for visual verification and is downloadable per run. Machine-verifiable: the same hash is available via the public REST API, so an auditor or upstream system can confirm the certificate matches the actual run state without trusting the rendered HTML.
How is this different from the regular Vulnios vulnerability scanner?
The platform scanner runs unauthenticated, breadth-first vulnerability scans across your inventory (48 engines covering containers, repos, DAST, OSINT, dark-web). Vulnios PT runs authenticated, targeted pentests against a verified scope (15 engines tuned for active testing, AI Pentester for the hard cases, compliance + attestation pack). Different jobs — most customers use both. The PT product re-uses the platform's identity, RBAC, and billing.
How is scan isolation enforced?
Each tenant's scans run in a dedicated GKE namespace with a NetworkPolicy that denies cross-namespace traffic. Job pods are ephemeral (deleted on completion), credentials are pulled from Secret Manager at job start and never persisted to disk, and the dispatcher refuses to schedule a job whose scope resolves to a private IP, cloud-metadata endpoint (AWS / GCP / Azure), or DNS-rebind target. Per-tenant CPU + memory quotas prevent a noisy scan from impacting other tenants.
Can I bring my own Burp Suite Professional license?
Yes, on the enterprise tier. Burp Pro is licensed per-seat under PortSwigger's EULA, so we don't bundle it in shared SaaS. Upload your license key to Secret Manager and flip ptFlags.burpProEnabled — Burp Pro CLI then participates in the active scan pipeline alongside the bundled Dastardly engine. Dastardly (free) is included on every tier.

Run your first authenticated scan today

Verify ownership of a target → pick a profile → run. Findings land within minutes with CWE/CVSS/payload/evidence + AI triage + EPSS + KEV priority.