Shannon On Claude Code
Shannon's 5-phase pentest pipeline running natively in Claude Code β no Docker, no Temporal, just /pentest https://github.com/KeygraphHQ/shannon
Ask AI about Shannon On Claude Code
Powered by Claude Β· Grounded in docs
I know everything about Shannon On Claude Code. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
Shannon β Claude Code Native
Shannon's 5-phase penetration testing pipeline running natively in Claude Code.
No Temporal, no Docker, no worker processes. Just open claude and run /pentest <url>.
Quick Start
cd /home/us/shannon-claude
claude
/pentest https://target.com
With source code (white-box):
# Clone or symlink the target repo here
git clone https://github.com/org/repo.git .
# or
ln -s /path/to/repo/* .
claude
/pentest https://target.com
Requirements
Required
| Tool | Install | Purpose |
|---|---|---|
claude (Claude Code) | claude.ai/code | Run the pipeline |
node β₯ 18 | apt install nodejs | MCP server |
npm | apt install npm | MCP dependencies |
curl | Usually pre-installed | HTTP testing |
MCP Dependencies (already installed)
# native/node_modules/ is already present, no need to reinstall
# To update:
cd native && npm install
Optional (used if available)
| Tool | Install | Purpose |
|---|---|---|
nmap | apt install nmap | Port scanning |
subfinder | github.com/projectdiscovery/subfinder | Subdomain discovery |
whatweb | apt install whatweb | Technology fingerprinting |
sqlmap | apt install sqlmap | SQL injection automation |
oathtool | apt install oathtool | TOTP code generation (for MFA) |
| Playwright | npx playwright install chromium | Browser automation (MCP installs automatically) |
If optional tools are missing, the pipeline continues and skips those steps.
Pipeline β 5 Phases
Phase 1: Pre-Recon β code_analysis_deliverable.md
β
Phase 2: Recon β recon_deliverable.md
β
Phase 3: Vuln (Γ5 parallel)
ββ injection β injection_analysis_deliverable.md + injection_exploitation_queue.json
ββ xss β xss_analysis_deliverable.md + xss_exploitation_queue.json
ββ auth β auth_analysis_deliverable.md + auth_exploitation_queue.json
ββ authz β authz_analysis_deliverable.md + authz_exploitation_queue.json
ββ ssrf β ssrf_analysis_deliverable.md + ssrf_exploitation_queue.json
β
Phase 4: Exploit (conditional, Γ5 parallel)
ββ Only runs for non-empty queues with externally exploitable findings
β
Phase 5: Report β comprehensive_security_assessment_report.md
Model assignments:
- Pre-recon:
claude-opus-4(deep code analysis) - Vuln/Exploit:
claude-sonnet-4(5 parallel agents) - Report:
claude-haiku-4(executive summary writing)
Modes
Black-Box (URL only)
No source code, just a URL. Uses:
- nmap, subfinder, whatweb (external scanning)
- Playwright browser (frontend exploration, JS analysis)
- curl (API endpoint testing)
White-Box (URL + Source Code)
Project files present in this directory. Additionally:
- Source code analysis (taint analysis, code review)
- Route/controller mapping
- Auth/authz guard analysis
Output Files
All files are saved under deliverables/:
deliverables/
βββ code_analysis_deliverable.md # Pre-recon findings
βββ recon_deliverable.md # Attack surface map
βββ *_analysis_deliverable.md Γ 5 # Vulnerability analysis reports
βββ *_exploitation_queue.json Γ 5 # Exploit target lists
βββ *_exploitation_evidence.md Γ 5 # Exploitation evidence
βββ comprehensive_security_assessment_report.md # Final report
Audit log:
audit-logs/session.jsonl # Record of every tool call
MCP Tools
shannon-tools (native/mcp-stdio-wrapper.mjs)
| Tool | Description |
|---|---|
save_deliverable | Saves a deliverable file to deliverables/ with validation |
generate_totp | Generates a TOTP code from a Base32 secret (for MFA-protected sites) |
The SHANNON_TARGET_DIR env var sets the target directory (default: .).
playwright
Headless Chromium browser for browser interactions, form filling, and JS execution.
Configuration
Sites Requiring Login
Pass login details directly to the /pentest skill:
/pentest https://target.com
Login URL: https://target.com/login
Username: testuser@example.com
Password: testpass123
Login type: form
With MFA/TOTP:
TOTP Secret: JBSWY3DPEHPK3PXP
Scope Restrictions
/pentest https://target.com
Rules to Avoid: /admin, /billing, payment endpoints
Focus: authentication, authorization
File Structure
shannon-claude/
βββ README.md
βββ .mcp.json # Playwright + Shannon MCP configuration
βββ .claude/
β βββ settings.json # Tool permissions + audit hook
β βββ agents/ # 13 agent definitions
β β βββ pre-recon.md (opus)
β β βββ recon.md (sonnet)
β β βββ vuln-auth.md (sonnet)
β β βββ vuln-authz.md (sonnet)
β β βββ vuln-injection.md (sonnet)
β β βββ vuln-xss.md (sonnet)
β β βββ vuln-ssrf.md (sonnet)
β β βββ exploit-auth.md (sonnet)
β β βββ exploit-authz.md (sonnet)
β β βββ exploit-injection.md (sonnet)
β β βββ exploit-xss.md (sonnet)
β β βββ exploit-ssrf.md (sonnet)
β β βββ report.md (haiku)
β βββ skills/
β β βββ pentest/SKILL.md # /pentest orchestrator skill
β βββ hooks/
β βββ audit-logger.sh # Tool call audit logging
βββ native/
βββ mcp-stdio-wrapper.mjs # MCP server (save_deliverable, generate_totp)
βββ package.json
βββ node_modules/
Differences from Shannon (Original)
| Feature | Shannon (Temporal) | Claude Code Native |
|---|---|---|
| Orchestration | Temporal workflow | Skill prompt |
| Parallel agents | Promise.allSettled | Agent tool parallel calls |
| Crash recovery | Temporal durable execution | None |
| Resume/workspace | Git checkpoint + session | None |
| Retry | Temporal retry policy (3x) | None |
| Playwright | 5 isolated instances | Single shared instance |
| Setup | Docker + npm build | npm install only |
Troubleshooting
claude command not found:
which claude || echo "Claude Code is not installed"
MCP server won't start:
cd native && node mcp-stdio-wrapper.mjs
# If errors: npm install
Playwright not working:
npx playwright install chromium
Pipeline stopped mid-run:
# Clean up and restart
rm -rf deliverables workspace audit-logs
claude
/pentest https://target.com
nmap/subfinder not found: The pipeline still runs β those scans are simply skipped. All external tools are optional.
License
This project is a derivative of Shannon and is licensed under the GNU Affero General Public License v3.0 β see LICENSE for the full text.
Original copyright: Copyright (C) 2025 Keygraph, Inc.
Modifications made in this derivative:
- Removed Temporal workflow orchestration layer
- Removed Docker and worker process infrastructure
- Adapted all 13 agent prompts to Claude Code native agent format (
.claude/agents/) - Added
/pentestskill orchestrator replacingpentestPipelineWorkflow - Replaced in-process MCP server with stdio-compatible wrapper (
native/mcp-stdio-wrapper.mjs) - Added black-box mode detection for URL-only operation without source code
Acknowledgements
All penetration testing methodology, prompt engineering, vulnerability analysis frameworks, and agent definitions originate from Shannon by Keygraph, Inc.
