What You’ll Get Back
When the assessment completes, Neo delivers a set of validated findings. Each one includes:- The exact exploit — payload, request, and response that confirmed the vulnerability
- Reproduction steps — a walkthrough your team can follow to verify it independently
- Remediation guidance — specific to your codebase, pointing to the files and patterns involved
- Severity and classification — based on real exploitability and impact, mapped to OWASP and CWE
What Comes Next
Your first scan gives you a baseline. From here, Neo can expand into your ongoing development lifecycle:- Enable PR reviews to automatically assess every pull request for security issues before it merges. Go to Settings → Automation → PR Reviews.
- Set up scheduled assessments to continuously test your full stack on a daily or weekly cadence. Go to Automations.
- Push a fix for any finding and Neo automatically retests to confirm the vulnerability is resolved and monitors for regressions going forward.
Next: Core Concepts
Understand the architecture behind Neo’s assessments: agents, capabilities, memory, and more.

