1. Enter Target
Provide a URL, GitHub repository, or local mounted repository path.
Detailed Platform Overview
Launch autonomous security scans across web targets and repositories using specialized agents. Lumina coordinates recon, exploit simulation, dependency analysis, and report synthesis in one high-trust workflow.
Target Modes
URL + Repo
Specialist Agents
10
Live Telemetry
SSE
Report Output
Markdown
A clear operational path keeps scans explainable and demo-friendly from kickoff to findings export.
1. Enter Target
Provide a URL, GitHub repository, or local mounted repository path.
2. Agent Planning
Lumina fingerprints the target and composes an adaptive scan plan.
3. Live Execution
Specialist agents run tools in parallel and stream activity in real time.
4. Actionable Findings
Severity-grouped findings and attack-chain context arrive in a structured report.
Mission Console Preview
[planner] fingerprint complete: target type=repository, languages=Python, TypeScript
[planner] execution plan selected: static -> deps_py -> deps_js -> secrets -> report
[static] semgrep running against source tree
[discovery] potential SQL injection sink identified in auth service
[deps_py] pip-audit found 1 high-severity advisory
[synthesis] final report queued with MITRE-aligned attack chain
Agent Modules
Planner
runningLLM + fingerprint
Recon
queuedhttpx · nmap · whatweb
SQLi
queuedsqlmap
XSS
queueddalfox
Static
idlesemgrep · bandit
Secrets
idletrufflehog
Attack Chain
idleMITRE inference
Report
idleLLM synthesis
Findings Output
SQL injection path in login endpoint
sqlmap detected injectable parameter in `/api/login` with stacked query behavior.
Hardcoded credential discovered
trufflehog flagged exposed token pattern in `config/settings.py`.
Outdated dependency with known CVE
pip-audit identified vulnerable package version in lockfile.