Run a scoped recon scan
Validate a target against the selected platform’s scope rules, then queue the recon worker. Use this only on in-scope assets for active programs.
- Intigriti: all in-scope targets for the program are allowed (provide the program URL).
- HackerOne: all in-scope targets for the program are allowed (provide the program URL).
- YesWeHack: all in-scope targets for the program are allowed (provide the program URL).
- Bugcrowd: currently limited — only the target encoded in the program URL may be used.
- Uploaded scope JSON: target must match an entry in the uploaded file.
- Targets can be a URL, host/path, or wildcard.
- Wildcards must be entered without a scheme (use
*.example.com, nothttps://*.example.com). - Timing: wildcard runs can take up to ~70 minutes; most other runs finish in ~30 minutes.
- Keep the bundle — it includes raw logs and exports.
- Scope validation (Bugcrowd / Intigriti / HackerOne / YesWeHack)
- Quick or full recon pipeline (inventory, crawl, JS grep, headers)
- Unauth samplers: CORS, redirects, rate-limit, echo reflect, login redirect checks
- Exports + bundle.zip artifacts
- No AI and No Pro plugins
- Everything in Free
- AI Summary appended to findings
- Pro plugins: XSS pipeline, msarjun param discovery, takeover checks
- Optional OSINT add-ons (e.g., Scribd) when enabled
No run yet. Start a scoped recon to see results here.
