Maps the real application, not the marketing site
The agent authenticates, follows business flows, fingerprints the stack, identifies parameters, hidden endpoints and state machines. It builds the same mental model a human pentester would, then tests against it.
- Auth flowsOAUTH · JWT · SSO
- Coverage modelSTATEFUL
- Hidden endpointsDISCOVERED