Searching protocol for "perseus"
Kick off Perseus security with a phased plan.
Generate executive security reports for Phase 4.
Run all specialist analyses in parallel.
Expose exploitable paths in code components.
Orchestrate a full, automated security assessment.
Dynamic exploit verification for safe pentests.
Deep-dive, multi-language injection analysis.
Map architecture, entry points, and attack surface.
Deep API security analysis for your codebase.
Supply chain risk analysis for your codebase.
Identify and fix file security flaws.
Harden deployments via security config analysis