TE
TechEcho
StartseiteTop 24hNeuesteBesteFragenZeigenJobs
GitHubTwitter
Startseite

TechEcho

Eine mit Next.js erstellte Technologie-Nachrichtenplattform, die globale Technologienachrichten und Diskussionen bietet.

GitHubTwitter

Startseite

StartseiteNeuesteBesteFragenZeigenJobs

Ressourcen

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. Alle Rechte vorbehalten.

Launch HN: MindFort (YC X25) – AI agents for continuous pentesting

60 Punktevon bveisehvor 6 Tagen
Hey HN! We&#x27;re Brandon, Sam, and Akul from MindFort (<a href="https:&#x2F;&#x2F;mindfort.ai">https:&#x2F;&#x2F;mindfort.ai</a>). We&#x27;re building autonomous AI agents that continuously find, validate, and patch security vulnerabilities in web applications—essentially creating an AI red team that runs 24&#x2F;7.<p>Here&#x27;s a demo: <a href="https:&#x2F;&#x2F;www.loom.com&#x2F;share&#x2F;e56faa07d90b417db09bb4454dce8d5a" rel="nofollow">https:&#x2F;&#x2F;www.loom.com&#x2F;share&#x2F;e56faa07d90b417db09bb4454dce8d5a</a><p>Security testing today is increasingly challenging. Traditional scanners generate 30-50% false positives, drowning engineering teams in noise. Manual penetration testing happens quarterly at best, costs tens of thousands per assessment, and takes weeks to complete. Meanwhile, teams are shipping code faster than ever with AI assistance, but security reviews have become an even bigger bottleneck.<p>All three of us encountered this problem from different angles. Brandon worked at ProjectDiscovery building the Nuclei scanner, then at NetSPI (one of the largest pen testing firms) building AI tools for testers. Sam was a senior engineer at Salesforce leading security for Tableau. He dealt firsthand with juggling security findings and managing remediations. Akul did his master&#x27;s on AI and security, co-authored papers on using LLMs for ecurity attacks, and participated in red-teams at OpenAI and Anthropic.<p>We all realized that AI agents were going to fundamentally change security testing, and that the wave of AI-generated code would need an equally powerful solution to keep it secure.<p>We&#x27;ve built AI agents that perform reconnaissance, exploit vulnerabilities, and suggest patches—similar to how a human penetration tester works. The key difference from traditional scanners is that our agents validate exploits in runtime environments before reporting them, reducing false positives.<p>We use multiple foundational models orchestrated together. The agents perform recon to understand the attack surface, then use that context to inform testing strategies. When they find potential vulnerabilities, they spin up isolated environments to validate exploitation. If successful, they analyze the codebase to generate contextual patches.<p>What makes this different from existing tools? Validation through exploitation: We don&#x27;t just pattern-match—we exploit vulnerabilities to prove they&#x27;re real; - Codebase integration: The agents understand your code structure to find complex logic bugs and suggest appropriate fixes; - Continuous operation: Instead of point-in-time assessments, we&#x27;re constantly testing as your code evolves; - Attack chain discovery: The agents can find multi-step vulnerabilities that require chaining different issues together.<p>We&#x27;re currently in early access, working with initial partners to refine the platform. Our agents are already finding vulnerabilities that other tools miss and scoring well on penetration testing benchmarks.<p>Looking forward to your thoughts and comments!

9 comments

mparisvor 6 Tagen
Congrats on the launch. Seems like a natural domain for an AI tool. One nice aspect about pen testing is it only needs to work once to be useful. In other words, it can fail most of the time and no one but your CFO cares. Nice!<p>A few questions:<p>On your site it says, &quot;MindFort can asses 1 or 100,000 page web apps seamlessly. It can also scale dynamically as your applications grow.&quot;<p>Can you provide more color as to what that really means? If I were actually to ask you to asses 100,000 pages what would actually happen? Is it possible for my usage to block&#x2F;brown-out another customer&#x27;s usage?<p>I&#x27;m also curious what happens if the system does detect a vulnerability. Is there any chance the bot does something dangerous with e.g. it&#x27;s newly discovered escalated privileges?<p>Thanks and good luck!
评论 #44120496 未加载
sumanyusharmavor 6 Tagen
Congratulations on the launch. Few qs:<p>How do your agents decide a suspected issue is a validated vulnerability, and what measured false-positive&#x2F;false-negative rates can you share?<p>How is customer code and data isolated and encrypted throughout reconnaissance, exploitation, and patch generation (e.g., single-tenant VPC, data-retention policy)?<p>Do the agents ever apply patches automatically, or is human review required—and how does the workflow integrate with CI&#x2F;CD to prevent regressions?<p>Ty!
评论 #44120635 未加载
robszumskivor 6 Tagen
How does a customer use this?<p>Point it at a publicly available webapp? Run it locally against dev? Do I self-host it and continually run against staging as it&#x27;s updated?
评论 #44120658 未加载
Sohcahtoa82vor 5 Tagen
One thing I&#x27;ve run into with DAST tools is that they&#x27;re awful at handling modern web apps where JS code fetches data with an API and then updates the DOM accordingly. They act like web pages are still using server-side HTML rendering and throw XSS false positives because a JSON response will return &quot;&lt;script&gt;alert(1)&lt;&#x2F;script&gt;&quot; in the data, even when the data is then put in the web page using either element.innerText or uses a framework that automatically prevents XSS.<p>Alternatively, they don&#x27;t properly handle session tokens that don&#x27;t rely on cookies, such as bearer tokens. At the place I work, in our app, the session token is passed as parameter in the request payload. Not a cookie or the Authorization header!<p>How well does MindFort handle these scenarios?
gyanchawdharyvor 6 Tagen
Congratulations on the launch. How different is this from xbow.com, shinobi.security, gecko.security. zeropath.com etc ?
评论 #44120737 未加载
HocusLocusvor 5 Tagen
You&#x27;re gonna poke your eye out with those pentesters...
handfuloflightvor 6 Tagen
Any outlines on pricing?
评论 #44120677 未加载
blibblevor 6 Tagen
what controls do you have to ensure consent from the target site?
评论 #44118111 未加载
评论 #44120687 未加载
lazyninja987vor 6 Tagen
Is it a pre-requisute for the agents to have access to the source code to generate attack strategies?<p>How about pen-testing a black box?<p>Does the potential vulnerabilities list is generated by matching list of vulnerabilities that are publicly disclosed for the framework version of target software stack constituents?<p>I am new to LLMs or any ML for that matter. Congrats on your launch.
评论 #44120831 未加载