Add-on

Audit-ready pentests in hours, not weeks.

AI penetration testing agents autonomously probe your code, APIs, and infrastructure - then deliver a vulnerability report with proof of exploit that your SOC 2 or ISO 27001 auditor will accept.

Start freeSee how it works

How it works

Three steps to a complete pentest

Step 1

Connect

Point Matproof at your repositories and domains. Connect your GitHub, GitLab, or Bitbucket repos and enter the URLs you want tested. Setup takes under five minutes.

Step 2

Scan

AI agents autonomously probe your entire attack surface - web applications, APIs, source code, and cloud infrastructure. They think like attackers, chaining vulnerabilities to find real exploits.

Step 3

Report

Receive a comprehensive, audit-ready report with proof of exploit for every finding. Each vulnerability includes reproduction steps, severity scoring, and a recommended fix - ready for your SOC 2 or ISO 27001 auditor.

Platform

Full-stack security coverage

AI agents test every layer of your application - from frontend to infrastructure.

Web Security

Autonomous API & web app testing

AI agents crawl and test every endpoint, form, and API route. Covers OWASP Top 10, business logic flaws, authentication bypasses, and session management vulnerabilities.

Code Security

Deep source code analysis

Static and semantic analysis of your codebase. Finds injection flaws, hardcoded secrets, insecure dependencies, cryptographic weaknesses, and unsafe deserialization patterns.

Infrastructure

Cloud & network security testing

Enumerates cloud resources, tests network services, and checks infrastructure configurations. Covers AWS, Azure, GCP misconfigurations, exposed ports, and privilege escalation paths.

Remediation

From issue to fix in minutes

1

Discover

AI agents systematically find critical issues across your entire stack - from SQL injection in your API to misconfigured S3 buckets in your cloud.

2

Auto-validate

Every finding is reproduced with a real proof of exploit. No false positives - if it is in the report, it is a confirmed vulnerability with evidence your auditor can verify.

3

Auto-fix

For supported repositories, Matproof generates merge-ready pull requests that fix each vulnerability. Review, approve, and merge - your security posture improves in minutes.

Zero false positives

Every finding is validated

No noise, no guesswork. If it is in the report, it has been exploited and confirmed.

Proof of Exploit

Every vulnerability comes with a working exploit demonstration - not just a theoretical risk score.

Auto-Triage

AI classifies severity using CVSS and business context, so your team fixes what matters first.

Deduplication

Related findings are grouped automatically. One root cause, one fix - no duplicate noise.

Smart Prioritization

Findings ranked by exploitability, business impact, and ease of fix - not just CVSS score.

Audit-Ready Report

Reports formatted for SOC 2 Type II, ISO 27001 Annex A, and DORA Article 24 TLPT requirements.

Continuous Monitoring

Schedule recurring scans to catch regressions. Get alerted when new vulnerabilities appear in your stack.

Testing modes

Choose your approach

Black-box Testing

External-only testing with no source code access. AI agents attack your application the same way a real attacker would - through your public-facing endpoints, APIs, and infrastructure.

  • No source code needed
  • Tests external attack surface
  • Faster scan times
  • Simulates real-world attacks

White-box Testing

Full source code review combined with dynamic testing. AI agents analyze your codebase line by line, then verify findings with live exploitation - the most comprehensive approach.

  • Full source code analysis
  • Finds hidden vulnerabilities
  • Deeper coverage
  • Merge-ready fix PRs

Pricing

Simple, predictable pricing

Add-on
AI Penetration Testing
$99 / month

Includes 3 pentest runs per month.

Additional runs at $49 each.

  • Web, code, and infrastructure scanning
  • Proof of exploit for every finding
  • SOC 2 & ISO 27001-ready reports
  • Auto-fix with merge-ready PRs
  • Black-box and white-box modes
  • Continuous monitoring & alerts
Start free

Available as an add-on to any Matproof plan. No long-term commitment.

Frequently asked questions

What is AI penetration testing?

AI penetration testing uses autonomous AI agents to probe your applications, APIs, source code, and infrastructure for security vulnerabilities. Unlike traditional pentests that rely on manual effort over weeks, AI agents can test thousands of attack vectors in hours - delivering audit-ready reports with proof of exploit for every finding.

How long does a scan take?

Most scans complete in 2 to 8 hours depending on the size of your attack surface. A typical web application with API takes around 3 hours. Full white-box scans including source code analysis may take up to 12 hours for large codebases. You will receive results as findings are confirmed - no need to wait for the full scan to finish.

Is this compatible with SOC 2 and ISO 27001 audits?

Yes. Reports are formatted to satisfy SOC 2 Type II penetration testing requirements and ISO 27001 Annex A.12.6 (Technical vulnerability management). Each finding includes CVSS scoring, reproduction steps, evidence screenshots, and remediation guidance - exactly what your auditor needs.

Is it safe to run against production?

Yes. AI agents are designed to detect and confirm vulnerabilities without causing damage or data loss. Exploitation is performed in a controlled manner - for example, SQL injection is confirmed by extracting a single benign record, not by dumping your database. You can also run scans against staging environments.

How does this compare to a traditional pentest?

Traditional pentests cost $15,000 to $50,000 per engagement and take 2 to 4 weeks. AI pentesting delivers comparable coverage in hours at a fraction of the cost. The key difference: AI agents can run continuously, catching new vulnerabilities as you ship code - not just once a year before your audit.

What types of vulnerabilities do you find?

The full OWASP Top 10, plus business logic flaws, authentication bypasses, API abuse, hardcoded secrets, insecure dependencies, cloud misconfigurations, privilege escalation, and more. Each finding is validated with a working proof of exploit - no theoretical risks or false positives.

Do I need to give you source code access?

No. You can run black-box scans against any URL or IP without providing source code. For deeper coverage, you can optionally connect your GitHub, GitLab, or Bitbucket repositories for white-box analysis that combines static code review with dynamic testing.

Can I use this for DORA TLPT requirements?

AI penetration testing can supplement your DORA Article 24 threat-led penetration testing (TLPT) program. While TLPT for systemically important institutions may require additional human-led red team exercises, Matproof's automated scanning provides continuous coverage between formal TLPT engagements and satisfies ongoing resilience testing requirements.

Get started

Stop guessing. Start testing.

Add AI penetration testing to your Matproof account and get your first vulnerability report today. No setup calls, no waiting.

Start freeView all plans