-

Intruder Announces AI Pentesting: Delivering The Depth of a Pentest, On-Demand

  • AI Pentesting helps stretched teams keep up with a fundamentally altered threat landscape by delivering the depth of a pentest, whenever it's needed.
  • Agents actively investigate and validate a wide range of issues including injection issues, client-side attacks and information disclosure risks surfaced in Intruder, using the same methods employed by human pentesters and security experts.
  • Issue level pentesting investigations are available now on Cloud, Pro, and Enterprise plans, with full scope, audit-ready web app pentests expected by the end of this quarter.

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced AI Pentesting and released its first pentesting agents as the company works towards enabling continuous, AI-powered pentesting and red teaming across web apps, external and internal networks. With this initial release, agents will actively investigate vulnerability scanner findings identified in Intruder using the same methods employed by human pentesters and security experts.

AI is rapidly transforming the cybersecurity landscape for both attackers and defenders. Weaponized exploits are increasing and time-to-exploit has collapsed as AI enables attackers to accomplish more, faster. Annual or quarterly pentests do not offer organizations the same level of protection they used to.

Security Teams Stretched, Investing in Automation

According to Intruder’s latest survey, The Security Middle Child Report, 49% of security leaders cite AI and automation as their top investment priority for 2026. Additionally, 42% of midmarket security teams are stretched, overwhelmed, or consistently behind. This demonstrates an industry need for automated solutions that relieve security teams of manual, time-consuming tasks while simultaneously helping them keep up with a fundamentally altered threat landscape.

“Pentesting has long been an essential component of any security program,” said Andy Hornegold, Chief Security Technologist at Intruder. “But in the age of AI, where attackers can move faster than ever, the volume of vulnerabilities is growing and exploit windows have shrunk from months to days to hours. The old playbook that called for a quarterly or annual pentest has long been unfit for purpose. The state of the threat landscape necessitates a new approach, focused on delivering the depth of a manual pentest, on-demand.”

The Depth of a Pentest, On Demand

Pentests and vulnerability scans share a common goal but differ in their approaches. Vulnerability scanners deliver broad, affordable and frequent coverage. On the other hand, pentests are infrequent, expensive and require depth and context to go deeper, validate issues and assess impact. AI pentesting provides the investigative depth of a manual pentest whenever you need it. Security and IT teams can now pentest with every new release, every new cloud service, and every new finding, without the wait.

AI Pentesting also gives stretched teams time back. Triage, investigation, and validation are the slowest parts of the remediation cycle and have typically required a human analyst and hours of investigation. Intruder’s pentesting agents reduce investigation time to minutes so security, IT and developer teams spend less time working on false positives and more time fixing actual problems.

Issue Level AI Pentesting Investigations Now Available

In this initial release, AI agents conduct pentesting investigations by interacting directly with the target, sending requests, analyzing responses, and probing for exposed data to build a picture of the issue's real-world impact. Pentesting agents can investigate a wide range of issues including:

  • Injection issues: The agent validates injection flaws – vulnerabilities that let attackers manipulate an application's commands, queries, or instructions to gain unauthorized access, by reproducing scanner findings with error-based, timing-based, UNION-based, and other injection techniques.
  • Client-side attacks: The agent validates client-side findings like clickjacking, attacks that target your application's users rather than the app itself. Scanners flag clickjacking whenever frame-related headers are missing, but some pages are intentionally frameable and pose no real risk. Traditional scanners can't make that distinction, but Intruder’s AI pentesters can.
  • Information disclosure: Scanners flag when information such as configuration details or open cloud storage buckets are exposed to unauthorized users, but can't assess whether the exposed data is actually sensitive. Intruder’s AI pentesting agent confirms the scanner's finding, reviews what's exposed, and evaluates how an attacker could use it. If it finds credentials like login details or API keys, it will attempt to verify whether they're valid.

Intruder expects to release new capabilities regularly over the coming quarter, including full scale AI web application pentests that can be used as compliance and audit evidence. Free trial users and Intruder customers on the Cloud, Pro, and Enterprise plans now have access to AI Pentesting credits. Additional credits are available for purchase. More information on Intruder’s AI Pentesting capabilities can be found on the company blog.

Security, IT, and developer teams interested in learning more about the Intruder platform and its latest offerings can book an introductory call here.

About Intruder

Intruder’s exposure management platform helps lean security teams stop breaches before they start by proactively discovering attack surface weaknesses. By unifying attack surface management, cloud security, continuous vulnerability management and AI pentesting in one intuitive platform, Intruder makes it easy to stay secure by cutting through the noise and complexity. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder is now protecting over 3,000 companies worldwide. Learn more at https://intruder.io.

FAQs

Why are exploit windows shrinking faster than security teams can respond?

According to Intruder's Security Middle Child Report, 42% of midmarket security teams are already stretched, overwhelmed, or consistently behind, while attackers are accelerating. AI now enables threat actors to weaponize vulnerabilities in hours rather than months, meaning the intervals between pentests have become windows of compounding risk. Intruder's pentesting agents close that gap by delivering the depth of a manual pentest on-demand.

What is AI Pentesting and how does it work?

AI Pentesting uses purpose-built AI agents to automatically investigate scanner findings to confirm which vulnerabilities and attack surface issues represent real, exploitable risk. Unlike traditional scanners that flag potential issues and leave validation to human analysts, AI Pentesting completes that investigation in minutes.

What is the best automated pentesting platform for midmarket security teams?

Intruder's AI Pentesting gives stretched security teams access to manual-pentest depth without the cost or scheduling overhead of traditional engagements. The platform unifies attack surface management, vulnerability scanning, and now AI-driven investigation in a single interface. Forthcoming full scale web application pentests will be usable as compliance and audit evidence for frameworks including SOC 2, ISO 27001, and PCI DSS. It's available now on Intruder's Cloud, Pro, and Enterprise plans, with full web app pentesting expected over the coming quarter.

Contacts

Media Contact
Treble
Katie Anne Hayes
intruder@treblepr.com

Intruder


Release Versions

Contacts

Media Contact
Treble
Katie Anne Hayes
intruder@treblepr.com

More News From Intruder

Intruder Bolsters its Cloud Security Offerings with the Release of Container Image Scanning

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced the release of Container Image Scanning — a new upgrade to its cloud security capabilities that automatically scans container images for vulnerabilities, granting customers clear, actionable insight into container risk without deploying and maintaining scanning agents across their estates. Leveraging existing integrations with major cloud providers, Intruder now supports Amazon Web Services Elastic Container Reg...

 Intruder Releases the Security Middle Child Report, Revealing How the Cybersecurity Industry Is Leaving Midmarket Businesses Behind

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today released its Security Middle Child Report, which uncovered that almost half of cybersecurity leaders at midmarket businesses, e.g. companies with at least $50M revenue and between 400-6000 employees, say they don’t have the right technology solutions, leaving them stuck in what Intruder calls the “security middle child problem." 46% say enterprise platforms assume more staff, budget, or complexity than they can support an...

Intruder Recognized as a 2026 G2 Best UK Software Company

LONDON--(BUSINESS WIRE)--Intruder, a leader in exposure management, today announced it has been named to G2’s 2026 Best Software Awards, placing 40th on the Best UK Software Companies list out of over 3,000 total vendors. G2 users consistently praise Intruder’s product for its ease of use and intuitive interface. As the world’s largest and most trusted software marketplace, G2 reaches over 100 million buyers annually. Its annual Best Software Awards rank the world’s best software companies and...
Back to Newsroom