Research Preview

Autonomous SecurityResearch atMachine Scale

Purpleswarm is an agentic security platform that continuously maps, probes, and analyzes your infrastructure, surfacing vulnerabilities before adversaries do. It's built to defend in a threat landscape where high-reasoning AI has fundamentally changed how exploitation works.

Sign in

Early access is available to qualified security and engineering teams.

Capabilities

Sandboxed Agent Swarm
for autonomous security research.

A coordinated swarm of specialized agents autonomously researches your target infrastructure, executing professional-grade tools within isolated sandbox environments. Each agent continuously loops over identified attack surfaces and vectors, while reasoning agents generate novel hypotheses and testing strategies that scripted scanners simply cannot discover.

01

Attack Surface Discovery

Purpleswarm continuously monitors the public internet for exposed assets belonging to your organization: subdomains, open ports, misconfigured services, and shadow infrastructure. All of this without generating a single packet of active traffic.

Non-Intrusive Observation

All discovery happens passively, ensuring zero operational impact on your systems. Findings go directly to verified asset owners.

Continuous Coverage

The platform maintains a living index of your external exposure and alerts you when new assets or anomalies surface.

02

Agentic Penetration Testing

A coordinated swarm of specialized agents runs full-scope penetration tests, reasoning across findings in real time instead of executing a fixed checklist. This mirrors how advanced adversaries actually operate: adaptive, persistent, and multi-stage.

Multi-Agent Orchestration

Agents work together dynamically. One maps the perimeter, another reasons about chained attack paths, a third validates exploitability under controlled conditions.

High-Reasoning Models

Powered by frontier language models selected for their demonstrated capability in adversarial reasoning tasks. This enables discovery of logic-level flaws that scripted scanners simply cannot reach.

03

Continuous Monitoring

Security analysis doesn't end with the initial test. Purpleswarm continues monitoring your system, listens to threat intelligence, and deploys agents to detect all changes.

Threat Intelligence

When a new security vulnerability is discovered, Purpleswarm automatically checks if you are affected and informs you immediately.

Change Detection

We continuously analyze every change on the system. Agents evaluate the differences and deploy specialized agents to test for regression bugs.

Arsenal

Knows all the techniques and tools
of professional security testers.

Purpleswarm agents are trained on the same methodologies and tools used by expert penetration testers, executing reconnaissance, enumeration, and exploitation with professional-grade precision.

nmap

Network Scanning

curl

HTTP Testing

Playwright

Browser Automation

OWASP ZAP

Web App Security

Python 3

Scripting

Metasploit

Exploitation Framework

NIST CVE

Vulnerability Database

RESTler

API Fuzzing

Burp Suite

Web Proxy

Nuclei

Vulnerability Scanner

nmap

Network Scanning

curl

HTTP Testing

Playwright

Browser Automation

OWASP ZAP

Web App Security

Python 3

Scripting

Metasploit

Exploitation Framework

NIST CVE

Vulnerability Database

RESTler

API Fuzzing

Burp Suite

Web Proxy

Nuclei

Vulnerability Scanner

nmap

Network Scanning

curl

HTTP Testing

Playwright

Browser Automation

OWASP ZAP

Web App Security

Python 3

Scripting

Metasploit

Exploitation Framework

NIST CVE

Vulnerability Database

RESTler

API Fuzzing

Burp Suite

Web Proxy

Nuclei

Vulnerability Scanner

ffuf

Web Fuzzing

sqlmap

SQL Injection

Nikto

Web Server Scanner

Amass

Asset Discovery

Subfinder

Subdomain Enum

httpx

HTTP Probing

TheHarvester

OSINT Gathering

OpenVAS

Vulnerability Assessment

SSTImap

SSTI Detection

Mimikatz

Credential Extraction

ffuf

Web Fuzzing

sqlmap

SQL Injection

Nikto

Web Server Scanner

Amass

Asset Discovery

Subfinder

Subdomain Enum

httpx

HTTP Probing

TheHarvester

OSINT Gathering

OpenVAS

Vulnerability Assessment

SSTImap

SSTI Detection

Mimikatz

Credential Extraction

ffuf

Web Fuzzing

sqlmap

SQL Injection

Nikto

Web Server Scanner

Amass

Asset Discovery

Subfinder

Subdomain Enum

httpx

HTTP Probing

TheHarvester

OSINT Gathering

OpenVAS

Vulnerability Assessment

SSTImap

SSTI Detection

Mimikatz

Credential Extraction

And hundreds more industry-standard tools, techniques, and vulnerability databases.

Collaboration

Human-Agent
Collaboration

Autonomous Speed, Human Ingenuity. Agents provide superhuman coverage and speed. Humans provide direction, creativity, and oversight. Together, they accomplish what neither could alone.

Manual Attack Scenarios

Define custom attack scenarios that matter to your organisation. Your security expertise guides the swarm toward the vulnerabilities that automated systems might overlook.

Custom Scenario

Test if admin endpoints are accessible through the mobile API gateway

Verify session tokens cannot be reused across tenant boundaries

Check for rate limiting bypass on authentication endpoints

Scenarios are translated into agent tasks and executed across your entire attack surface automatically.

FAQ

Common
questions.

Traditional penetration tests are point-in-time engagements: scoped, scheduled, and delivered as a static report. Purpleswarm operates continuously. The platform retests your infrastructure after every code change, new deployment, or newly discovered asset. This closes the gap between when a vulnerability is introduced and when it's identified.

As part of our research program, Purpleswarm conducts non-intrusive passive scans across the public internet to identify exposed assets and potential vulnerabilities. We don't attempt exploitation. When we identify a significant exposure, we contact the registered owner of the affected asset directly through responsible disclosure channels, giving them the information they need to fix the issue before others find it.

Recent independent evaluations, including published assessments from national AI safety institutes, have confirmed that the latest generation of high-reasoning AI models can materially accelerate vulnerability discovery and exploitation chain construction. Purpleswarm is designed to give defenders equivalent capability.

Yes. Aggression levels are configurable, from fully passive surface mapping through to authorized adversarial simulation. All agent activity is logged with full attribution, so there's no ambiguity between Purpleswarm activity and genuine attacker traffic. Safety constraints are enforced at the platform level, not left to individual configuration.

No. The platform is designed to be operated by engineering teams without specialist security knowledge. Reports use plain language with clear remediation guidance. Security professionals will find detailed artifacts like CVSS scores, MITRE ATT&CK mappings, and raw agent logs available for deeper investigation when needed.

Installing the GitHub or GitLab application is sufficient. From that point, every pull request triggers a dedicated analysis agent that evaluates the code diff in the context of your current attack surface. Findings are surfaced as inline comments. Critical issues can be configured to block merges pending remediation.

Yes. We routinely work under mutual non-disclosure agreements, particularly with organizations in regulated industries or those undergoing managed penetration testing engagements. Just indicate this when submitting your access request and we'll coordinate directly before any assessment begins.

All data, including scan results, findings, and account information, is stored exclusively within the European Union. We don't transfer assessment data outside the EU. Our infrastructure is hosted on EU-region cloud providers and complies with GDPR data residency requirements.

Yes. You can request full deletion of all data associated with your account and assessments at any time. Upon receiving a verified deletion request, all findings, scan artifacts, and account records are permanently removed from our systems within 30 days. We'll confirm completion in writing.

Ready to see what the
future of security
looks like?

Join the research preview and get early access to Purpleswarm. The threat landscape has changed. Your defense capabilities need to match.

Early access is available to qualified security and engineering teams.