• mparis 5 days ago

    Congrats on the launch. Seems like a natural domain for an AI tool. One nice aspect about pen testing is it only needs to work once to be useful. In other words, it can fail most of the time and no one but your CFO cares. Nice!

    A few questions:

    On your site it says, "MindFort can asses 1 or 100,000 page web apps seamlessly. It can also scale dynamically as your applications grow."

    Can you provide more color as to what that really means? If I were actually to ask you to asses 100,000 pages what would actually happen? Is it possible for my usage to block/brown-out another customer's usage?

    I'm also curious what happens if the system does detect a vulnerability. Is there any chance the bot does something dangerous with e.g. it's newly discovered escalated privileges?

    Thanks and good luck!

    • bveiseh 5 days ago

      Thanks so much!

      In regards to the scale, we absolutely can assess at that scale, but it would require quite a large enterprise contract upfront, as we would need to get the required capacity from our providers.

      The system is designed to safely test exploitation, and not perform destructive testing. It will traverse as far as it can, but it won't break anything along the way.

    • sumanyusharma 5 days ago

      Congratulations on the launch. Few qs:

      How do your agents decide a suspected issue is a validated vulnerability, and what measured false-positive/false-negative rates can you share?

      How is customer code and data isolated and encrypted throughout reconnaissance, exploitation, and patch generation (e.g., single-tenant VPC, data-retention policy)?

      Do the agents ever apply patches automatically, or is human review required—and how does the workflow integrate with CI/CD to prevent regressions?

      Ty!

      • bveiseh 5 days ago

        Appreciate it!

        The agents will hone in on a potential vulnerability by looking at different signals during its testing, and then build a POC to validate it based on the context. We don't have any data to share publicly yet but we are working on releasing benchmarks soon.

        Everything runs in a private VPC and data is encrypted in transit and at rest. We have zero data retention agreements with our vendors, and we do offer single tenant and private cloud deployments for customers. We don't retain any customer code once we finish processing it, only the vulnerability data. We are also in process of receiving our SOC 2.

        Patches are not auto applied. We can either open up a PR for human review or can add the necessary changes to a Linear/Jira ticket. We have the ability schedule assessments in our platform, and are working on a way to integrate more deeply with CI/CD.

      • robszumski 5 days ago

        How does a customer use this?

        Point it at a publicly available webapp? Run it locally against dev? Do I self-host it and continually run against staging as it's updated?

        • bveiseh 5 days ago

          So you would point it to any web app available over the internet. There is an option to have a private deployment in your VPC to test applications that are not exposed to the internet. You can also schedule assessments so that the system runs at a regular interval (daily, weekly, bi-weekly, etc)

        • Sohcahtoa82 4 days ago

          One thing I've run into with DAST tools is that they're awful at handling modern web apps where JS code fetches data with an API and then updates the DOM accordingly. They act like web pages are still using server-side HTML rendering and throw XSS false positives because a JSON response will return "<script>alert(1)</script>" in the data, even when the data is then put in the web page using either element.innerText or uses a framework that automatically prevents XSS.

          Alternatively, they don't properly handle session tokens that don't rely on cookies, such as bearer tokens. At the place I work, in our app, the session token is passed as parameter in the request payload. Not a cookie or the Authorization header!

          How well does MindFort handle these scenarios?

          • gyanchawdhary 5 days ago

            Congratulations on the launch. How different is this from xbow.com, shinobi.security, gecko.security. zeropath.com etc ?

            • bveiseh 5 days ago

              Thanks so much.

              We want to solve the entire vulnerability lifecycle problem not just finding zero days. MindFort works from detection, validation, triage/scoring, all the way to patching the vulnerability. While we are starting with web app, we plan to expand to the rest of the attack surface soon.

            • HocusLocus 4 days ago

              You're gonna poke your eye out with those pentesters...

              • handfuloflight 5 days ago

                Any outlines on pricing?

                • bveiseh 5 days ago

                  It depends on the size of your attack surface, complexity of the application, and frequency of assessments, so for now we are working out custom agreements with each customer based on these factors.

                • blibble 5 days ago

                  what controls do you have to ensure consent from the target site?

                  • bko 5 days ago

                    In the video demo they showed requiring a TXT in the DNS to confirm you have consent

                    • bveiseh 5 days ago

                      Yup as mentioned, we do the TXT verification of the domain. We also don't offer self service sign up, so we are able to screen customers ahead of time and regularly monitor for any bad behavior.

                    • curtisszmania 4 days ago

                      [dead]

                      • lazyninja987 5 days ago

                        Is it a pre-requisute for the agents to have access to the source code to generate attack strategies?

                        How about pen-testing a black box?

                        Does the potential vulnerabilities list is generated by matching list of vulnerabilities that are publicly disclosed for the framework version of target software stack constituents?

                        I am new to LLMs or any ML for that matter. Congrats on your launch.

                        • bveiseh 5 days ago

                          Thanks so much.

                          Great question, it is not required but we recommend it. If you don't include the source code, it would be black box. The agents won't know what the app looks like from the other side.

                          The agents identify vulns using known attack patterns, novel techniques, and threat intelligence.