Screenshots
Example Usage
$ ptai start https://staging.acme.com --auth-flow form_post \
--auth-url /login --auth-username admin --auth-password-env APP_PASS
[+] engagement eng-e512f47b target=staging.acme.com scope=web
[auth] ✓ Logged in as admin. Session captured, refresh in 14:32.
[recon] ✓ 3 open ports, 7 subdomains, Apache/PHP fingerprint.
[web] ✓ 21 findings behind auth. 3 SQLi, 4 XSS, missing CSP, CSRF gap.
[chain] ✓ Attack path found in 2 hops:
reflected XSS + cookie without Secure flag → admin session hijack
[validate] ✓ 3 findings proven with non-destructive PoCs.
[detect] ✓ Generated Sigma, SPL, KQL rules for the blue team.
[report] ✓ reports/eng-e512f47b.html · 12 pages · client-ready
Total: 4m 18s. Cost: $0.73 in Claude tokens.