Multi-level depth control
Choose how deep the agent goes. A surface-level review for quick triage, or a thorough investigation that follows data flows, maps trust boundaries, and explores edge cases.
Interactive chat follow-up
After the initial report, continue the conversation with the agent. Ask follow-up questions, request deeper analysis on specific findings, or explore alternative attack paths.
Structured reports
Every investigation produces a structured output with findings, severity assessments, affected code locations, attack scenarios, and actionable remediation steps.
Export to Markdown and JSON
Download research reports in Markdown for sharing with stakeholders, or JSON for integration with ticketing systems and security dashboards.
Multi-repository scope
Research investigations can span multiple repositories. If your application is split across services, the agent analyzes all of them in context to find cross-service vulnerabilities.
Context-aware reasoning
The agent does not just pattern-match. It reads your code, understands your authentication model, follows permission checks, and reasons about whether a vulnerability is actually exploitable in your specific architecture.