Automate security testing across web apps, APIs, and infrastructure with evidence-backed findings
Neo performs comprehensive penetration testing by automating reconnaissance, vulnerability discovery, exploitation, and evidence collection. It tests like a human pentester but with the speed and thoroughness of automation, capturing all findings with proof-of-concept and remediation guidance.
Prompt example:“Perform a security assessment of https://app.example.com. Test for common vulnerabilities including XSS, CSRF, authentication issues, and authorization bypasses. Use the test account credentials from environment variables.”What Neo does:
Maps the application by crawling and discovering all endpoints
Tests for injection vulnerabilities (XSS, SQLi, command injection)
Checks authentication and session management
Tests authorization controls and access restrictions
Validates CSRF protections
Captures screenshots and HTTP traces as evidence
Generates report with findings, severity, and reproduction steps
Prompt example:“Test the file upload feature at https://app.example.com/upload for security issues. Check for file type bypass, path traversal, malware upload, and stored XSS.”What Neo does:
Prompt example:“Assess the authentication mechanism at https://app.example.com/login. Test for brute force protection, password reset vulnerabilities, session fixation, and JWT weaknesses.”What Neo does:
Prompt example:“Test the REST API at https://api.example.com/v1 for security issues. Focus on authorization bypasses, injection attacks, and business logic flaws. Use the OpenAPI spec from Files.”What Neo does:
Reads OpenAPI specification to understand endpoints
Tests each endpoint for authorization bypasses
Checks for injection vulnerabilities in parameters
Tests business logic (IDOR, mass assignment, rate limits)
Prompt example:“Perform security testing on the GraphQL API at https://api.example.com/graphql. Test for introspection, authorization issues, and query complexity attacks.”What Neo does:
Prompt example:“Test the e-commerce checkout flow at https://shop.example.com for business logic vulnerabilities. Check for price manipulation, discount abuse, inventory bypass, and payment circumvention.”What Neo does:
Prompt example:“Test https://app.example.com for authorization vulnerabilities. Focus on horizontal and vertical privilege escalation, IDOR, and multi-tenancy issues. Test with user, admin, and manager roles.”What Neo does:
Tests access control with different user roles
Checks for horizontal privilege escalation (user A accessing user B’s data)
Prompt example:“Test the coupon redemption feature at https://app.example.com/coupons for race conditions. Check if multiple concurrent requests can bypass single-use restrictions.”What Neo does:
Sends concurrent requests to test race conditions
Validates single-use enforcement mechanisms
Tests for time-of-check-time-of-use (TOCTOU) issues
Prompt example:“Assess the internal admin panel at https://internal.example.com:8443. Test for default credentials, misconfigurations, and exposed sensitive data.”What Neo does:
Tests for default and common credentials
Checks for configuration issues
Validates SSL/TLS configuration
Tests for sensitive data exposure
Checks security headers and hardening
Documents misconfigurations with remediation guidance
Prompt example:“Test all URL-fetching features in https://app.example.com for SSRF vulnerabilities. Check image imports, webhooks, and external integrations.”What Neo does:
Identifies endpoints that fetch external URLs
Tests SSRF with internal IP ranges (127.0.0.1, 169.254.169.254)
Prompt example:“Test the mobile app API at https://mobile-api.example.com. Focus on authentication, API key exposure, and mobile-specific vulnerabilities.”What Neo does:
Prompt example:“Analyze the macOS app installer MyApp.dmg. Extract and decompile the application, find hardcoded secrets, API endpoints, configuration files, and embedded JavaScript. Test any discovered API endpoints for security issues.”What Neo does:
Prompt example:“Audit the Windows application Setup.exe. Extract embedded resources, decompile binaries, find API endpoints and secrets, then test the backend APIs.”What Neo does:
Extracts resources from PE executable
Decompiles .NET or native binaries
Identifies embedded JavaScript, HTML, and config files
Scans for hardcoded credentials and API keys
Extracts API endpoints and backend URLs
Analyzes update mechanisms and auto-updater security
Tests discovered APIs for authentication and authorization issues
Checks for DLL hijacking vulnerabilities
Documents extraction process and security findings
Prompt example:“Security audit the Electron app MyApp-1.2.3.dmg. Extract asar archive, analyze JavaScript source code, find API endpoints and secrets, test for Node.js integration vulnerabilities and XSS.”What Neo does:
Extracts the Electron application package
Unpacks asar archives to access source code
Analyzes JavaScript for hardcoded secrets and API endpoints
Checks for insecure Node.js integration (nodeIntegration, contextIsolation)
Tests for XSS with Node.js access
Validates CSP and security configurations
Checks update server security and integrity verification
Tests discovered backend APIs for vulnerabilities
Analyzes IPC communication for security issues
Documents all code-level findings with line references
Prompt example:“Perform a complete security audit of the desktop app MyApp.dmg. Extract all assets, find API endpoints and secrets, test the backend infrastructure, analyze update mechanisms, and check for local privilege escalation.”What Neo does:
Prompt example:“Extract all API endpoints from the Electron app MyApp.asar. Search JavaScript files for fetch(), axios, HTTP libraries, and WebSocket connections. Test each endpoint for security issues.”What Neo does:
Unpacks asar archive and analyzes all JavaScript files
Searches for HTTP client usage (fetch, axios, XMLHttpRequest, WebSocket)
Extracts base URLs, API paths, and query parameters
Prompt example:“Analyze all JavaScript files in DesktopApp.dmg. Find hardcoded secrets, encryption keys, API tokens, backend URLs, and sensitive business logic. Check configuration files for security issues.”What Neo does:
Extracts all JavaScript, JSON, and configuration files
Scans for patterns indicating secrets (API keys, tokens, passwords)
Identifies encryption keys and cryptographic material
Extracts environment variables and backend configurations
Analyzes authentication and session management logic
Checks for sensitive business logic in client-side code
Validates configuration file permissions and exposure
Documents all findings with file paths and line numbers
Prompt example:“Schedule weekly security scans of https://app.example.com. Alert immediately on critical findings and track changes from previous scans.”What Neo does:
Prompt example:“Before deploying v2.5 to production, test the staging environment at https://staging.example.com. Validate all security fixes from this release and check for new vulnerabilities.”What Neo does:
Tests all reported security fixes are effective
Performs regression testing on previously patched vulnerabilities