Loading…
Loading…
The same P1/P2 hunting methodology our analysts use by hand — running on demand against the targets you describe in plain English. Subdomain enumeration, attack-surface mapping, vulnerability discovery, board-ready reporting.
Black-box external recon, web app fuzzing, IDOR / auth bypass, SSRF — chained from one prompt.
Hooks into Burp Suite, ProjectDiscovery, custom path / header / JWT bypass tooling.
Every engagement ships a Coastline-branded report with VRT-mapped findings and remediation.
Sign in with your Coastline account to launch your first autonomous engagement.
Stuck? Reset auth state
Each credit buys one full pentest engagement. Credits never expire, and unsatisfactory runs are refundable for 30 days.
Production billing runs through Stripe. Dev grant is available
until STRIPE_SECRET_KEY is configured.
Connect a repo and Coastline will open a Pull Request with a concrete patch for every verified finding — straight to your review queue, no copy-paste from a DOCX.
No projects yet. Group recurring engagements (e.g. "Q1 external scan", "OWASP web app sweep") for cleaner tracking.
Org-wide visibility. Add members to restrict.
Everything the agent has ever discovered in your footprint, deduplicated across every engagement. A "new" asset appears for the first time in a scan; a re-confirmed asset was already on file. First-seen and last-seen timestamps drive the delta-pentest view.
No assets discovered yet. Run an engagement to populate the inventory.
| Type | Value | Seen | First | Last | Status |
|---|---|---|---|---|---|
| ● ○ |
⚠ Raw invite — creates a stub user but does NOT send them an email. They must sign up themselves with this email address.
Team invite — coming soon
Email-based invites + SSO auto-provisioning are in development. Contact sales@coastlinecyber.com to onboard a team manually in the meantime.
Use these for CI/CD integrations. Send as
Authorization: Bearer cstk_….
Tokens are only shown once on creation — store them securely.
No API tokens yet. Create one below to integrate Coastline with your CI/CD or scripted tooling.
revoked
expired
Notifications go to .
Your account identity. Email is managed by Auth0 — to change it, update your Auth0 profile and log back in.
Recurring engagements run automatically on the cadence you set. The next run fires shortly after the scheduled time.
No scheduled scans yet. Use the form below to set up a recurring engagement.
No activity yet — actions like job submissions, cancellations, finding triage will appear here for audit.
| Vuln class | Tested | Vulnerable | Clean |
|---|---|---|---|
| Repo | PR | Title | Opened |
|---|---|---|---|
| Kind | Label | Planted where | Hits | Last hit |
|---|---|---|---|---|
No findings reported yet.