πŸ›‘ Pentestas β€Ί help

Quick start

By the end of this page you'll have a verified domain and your first completed scan.

1. Create an account

Go to app.pentestas.com and sign up with email + password, Google, or Microsoft. Signing up with a corporate email creates a new tenant β€” a private workspace that will hold all your scans, findings, and team members.

Why a tenant? Every scan, finding, agent key, API key, and report is scoped to a single tenant. When you invite a teammate they join your tenant; they never see another customer's data even if they happen to scan the same target.

2. Verify a domain you own

Pentestas will only scan targets you can prove you control. This is a hard rule β€” the platform rejects scan requests against unverified domains so you can't point it at a competitor's site.

  1. In the app, open Settings β†’ Domains.
  2. Click Add domain, type the bare domain (e.g. example.com, not https://...).
  3. You'll get a random token (pentestas-verify=...). Add it as a TXT record at the zone apex.
  4. Click Verify. Pentestas queries your DNS; once the token resolves, the domain is unlocked for scanning.

More detail: Verify a domain.

3. Start a scan

  1. Dashboard β†’ New scan.
  2. Enter the target URL (full URL, including scheme β€” https://example.com/app).
  3. Pick scan types. For a first run, leave the defaults on: Web App, API, Authentication, Discovery.
  4. Click Start scan.

The scan begins within seconds. You'll see live progress: phases (Crawling β†’ Attack surface β†’ Payload testing β†’ AI analysis), streaming findings, and an attack-chain graph that updates as new findings land.

See Your first scan for a guided walkthrough.

4. Read your findings

  • Severity β€” CRITICAL / HIGH / MEDIUM / LOW / INFO. Explained in detail in Severity scale.
  • Validation status β€” Pentestas re-runs every finding against an "accuracy gate" that filters false positives before they're persisted. The Verified badge means an independent verifier re-confirmed the signal.
  • Attack chains β€” multi-step compromise paths combining several findings. Usually where the real business risk lives. See Attack chains.

5. Invite your team (optional)

Settings β†’ Team β†’ Invite by email. Roles:

Role Can scan Can view findings Can invite Can manage billing
Admin βœ“ βœ“ βœ“ βœ“
User βœ“ βœ“
Viewer βœ“

Where to go next