Built-in Intelligence

See what an attacker sees.
Automatically.

Automated penetration testing that scans your public servers from the outside. nmap, nuclei, testssl.sh and more — orchestrated end-to-end, AI-summarized, and mapped to compliance frameworks.

ManageLM pentest report viewer
9
Pentest types
65k
TCP ports scanned
0-100
Security score
7
Frameworks mapped
On this page

Overview

Built-in security audits tell you what is wrong inside your servers. Pentests answer the complementary question: what can an attacker reach from the outside? ManageLM runs industry-standard offensive tools against your public endpoints in a controlled, repeatable way — no VM to maintain, no Kali instance to stand up, no one-off scripts.

Behind the scenes, a dedicated pentest service orchestrates nmap, nuclei, testssl.sh, ffuf, subfinder, and a suite of purpose-built checks. Results are returned to the portal, summarized by an LLM into plain-English findings, and mapped to compliance controls automatically.

Available on Pro & Business plans. Pentests consume credits — Pro and Business plans include a bundle, and you can top up from Settings → Account. Only successful scans are charged; failures and cancellations are free.

Available tests

Nine test types cover the full external attack surface. Run them individually or bundle several into a single scan — credits are consumed per test, and URL-based tests run once per target URL.

TestWhat it doesCredits
Basic ScanPort discovery (nmap) + vulnerabilities (nuclei) + TLS quick check3
Full Port ScanAll 65,535 TCP ports — finds the forgotten services3
Vulnerability ScanExtended nuclei templates covering critical / high / medium CVEs3
SSL/TLS AuditFull testssl.sh analysis — protocols, ciphers, chain, HSTS, vulnerabilities1 / URL
Web App ScanNuclei web templates — exposed panels, default creds, misconfigs3 / URL
DNS AuditSPF, DMARC, DKIM, MX records — email spoofing & DNS hygiene1 / URL
HTTP HeadersSecurity headers analysis — CSP, HSTS, X-Frame-Options, etc.1 / URL
Directory ScanCommon path discovery with ffuf — backup files, config leaks2 / URL
Subdomain EnumPassive subdomain discovery with subfinder1 / URL

How it works

  1. Select targets
    Open the Pentests page, pick one or more public agents, select the tests to run, and add target URLs if needed. The portal estimates credit cost upfront.

  2. Prove ownership
    The portal mints a one-time validation token. The agent contacts the pentest service from its public IP and proves it controls the target — preventing you (or anyone else) from scanning hosts they don't own.

  3. Scan
    The pentest service runs the selected tools sequentially against your endpoints. Raw output is captured and timestamped.

  4. Summarize
    An LLM reads the raw tool output and generates a human-readable report with severity-rated findings, remediation guidance, and a 0–100 security score. Raw output is preserved as evidence.

Ownership & safety

Pentesting is a sharp tool — ManageLM is built so it can only cut your own grass. Multiple layers prevent misuse:

AI-generated reports

Raw nmap and nuclei output is powerful but noisy. ManageLM feeds every scan result into an LLM that extracts real findings, classifies severity, and writes the remediation section in the voice of a senior security engineer. What you see is:

Security score

0–100 weighted by finding severity, so you can track trend over time — per agent and fleet-wide.

Grouped findings

Open ports, exposed services, missing headers, weak TLS, web misconfigs — each with a one-line summary and full context.

Per-finding remediation

Concrete steps to fix each issue, tailored to the service detected (nginx vs. Apache, systemd vs. Windows Services).

Raw tool output

Every finding links back to the raw tool output — useful for auditors, root-cause analysis, and export pipelines.

Compliance integration

Pentest results don't live in a silo. Each tool produces pass/fail rules that map directly to compliance framework controls:

Run a pentest, and the same data feeds your framework coverage, drift detection, and evidence PDFs. A single scan can satisfy multiple audit requirements.

Pairs perfectly with Security Audit. Internal audits find configuration weakness; pentests find exploitable exposure. Together they give you the full picture — the defender's checklist and the attacker's playbook.

Scan from the outside.

Start with a Basic Scan on any one of your agents. 3 credits, roughly two minutes, zero setup.