Skill for Automated Pentesting from Keygraph Shannon
npx skills add https://github.com/unicodeveloper/shannon --skill shannonInstallieren Sie diesen Skill über die CLI und beginnen Sie mit der Verwendung des SKILL.md-Workflows in Ihrem Arbeitsbereich.
Autonomous AI pentester as a Claude Code skill. Wraps KeygraphHQ/Shannon — the white-box security testing framework that analyzes source code, identifies attack vectors, and executes real exploits to prove vulnerabilities before they reach production.
96.15% exploit success rate on the XBOW security benchmark (100/104 exploits).
npx skills add unicodeveloper/shannon
Or install globally:
npx skills add unicodeveloper/shannon -g -y
Once installed, run from Claude Code:
/shannon http://localhost:3000 myapp
Shannon will:
/shannon http://localhost:3000 myapp
/shannon --workspace=audit-q1 http://staging.example.com backend-api
/shannon --scope=xss,injection http://localhost:8080 frontend
/shannon status
/shannon results
/shannon stop
| Provider | Environment Variable |
|---|---|
| Anthropic API (recommended) | ANTHROPIC_API_KEY |
| Anthropic OAuth | CLAUDE_CODE_OAUTH_TOKEN |
| AWS Bedrock | CLAUDE_CODE_USE_BEDROCK=1 + AWS credentials |
| Google Vertex AI | CLAUDE_CODE_USE_VERTEX=1 + GCP service account |
export CLAUDE_CODE_MAX_OUTPUT_TOKENS=64000
Shannon covers 50+ vulnerability types across 5 OWASP categories, all tested with real exploits:
| Category | What's Tested |
|---|---|
| Injection | SQL injection (union, blind, time-based), command injection, server-side template injection (SSTI), NoSQL injection, LDAP injection |
| Cross-Site Scripting | Reflected XSS, stored XSS, DOM-based XSS, XSS via file upload, mutation XSS |
| SSRF | Internal service access, cloud metadata extraction (AWS/GCP/Azure), DNS rebinding, protocol smuggling |
| Broken Authentication | Default credentials, JWT vulnerabilities (none algorithm, weak signing), session fixation, CSRF, MFA bypass, brute force, account lockout flaws |
| Broken Authorization | IDOR, horizontal/vertical privilege escalation, path traversal, forced browsing, mass assignment, insecure direct object references |
Shannon operates as a multi-agent system with 5 phases:
Shannon Pipeline
━━━━━━━━━━━━━━━━
Phase 1: Pre-Recon
├── Static source code analysis
└── External scans (Nmap, Subfinder, WhatWeb)
Phase 2: Recon
└── Live attack surface mapping via headless browser
Phase 3: Vulnerability Analysis (5 parallel agents)
├── Injection agent
├── XSS agent
├── SSRF agent
├── Authentication agent
└── Authorization agent
Phase 4: Exploitation (parallel)
├── Each vuln agent spawns an exploitation agent
└── Real attacks executed to validate findings
Phase 5: Reporting
├── Executive summary
└── Reproducible PoC for every finding
No exploit, no report — Shannon only reports vulnerabilities it can prove with a working proof-of-concept. This minimizes false positives.
For targets that require login, the skill helps you create a YAML config:
# configs/target-config.yaml
authentication:
type: form # "form" or "sso"
login_url: "http://localhost:3000/login"
credentials:
username: "testuser"
password: "testpass123"
totp_secret: "BASE32SECRET" # optional, for 2FA
flow: "Navigate to login page, enter username and password, click Sign In"
success_condition:
url_contains: "/dashboard"
rules:
avoid:
- "/logout"
- "/admin/dangerous-action"
focus:
- "/api/"
- "/auth/"
pipeline:
max_concurrent_pipelines: 5 # 1-5, default 5
retry_preset: subscription # extended backoff for rate-limited API plans
Shannon runs inside Docker, so localhost on your machine isn't reachable from the container. The skill automatically handles this, but for reference:
| Platform | Use This Instead of localhost |
|---|---|
| macOS / Windows | http://host.docker.internal:PORT |
| Linux | http://host.docker.internal:PORT (may need --add-host flag) |
shannon-skill/
├── SKILL.md # Skill definition (metadata + Claude instructions)
├── CLAUDE.md # Project contributor instructions
├── README.md # This file
└── scripts/
├── setup-shannon.sh # Installs/updates Shannon, checks prerequisites
└── sync.sh # Deploys skill to ~/.claude, ~/.agents, ~/.codex
bash scripts/sync.sh
This syncs the skill to:
~/.claude/skills/shannon/~/.agents/skills/shannon/~/.codex/skills/shannon/bash scripts/setup-shannon.sh
Checks Docker, Git, clones Shannon, and validates API credentials.
Shannon executes real attacks against targets. The skill enforces safety at every step:
/logout, /admin/delete)Never run Shannon against systems you don't own or have explicit written authorization to test.
/shannon slash commandAGPL-3.0 — same as Shannon itself.