Six specialized agents coordinated by an orchestrator.
- Recon — subdomain enum, port scan, tech fingerprint.
- Crawler — Playwright spider, parameter discovery, JS route extraction.
- Hypothesis — propose vulnerability hypotheses with payload strategies.
- Exploit — adaptive payload generation, response observation.
- Validator — deterministic PoC runner. Headless browser for XSS, OOB callback for blind bugs, two-account replay for IDOR.
- Reporter — markdown + CVSS + remediation, ready for your tracker.