Settings
The Settings section of Pentest Copilot Enterprise provides several options to configure scans, usage details, integrations, and overall app configuration.
Usage
Credits
Credits represent the total number of scan runtime hours available to your account. These credits determine how long you can operate and execute scans.
Key Features:
View your total available credits
Monitor runtime hours you have consumed
Track remaining scan time
Credits are consumed based on actual scan execution time
Example: If you have 100 credits, this equals 100 hours of total scan runtime across all your assessments.
Usage Timeline
The Usage Timeline feature provides visibility into your historical scan activity and credit consumption patterns.
Key Features:
Filter scan runtime by custom date ranges
View detailed breakdown of past scan activity
Track credit consumption over time
Analyze usage patterns to optimize scan scheduling
Use the date range selector to view specific periods and understand how your credits have been utilized.
External Assessment Settings
Rate Limit
The Rate Limit setting controls the maximum number of HTTP requests per second that the scanner will send to the target application during an assessment.
Purpose:
Prevent overwhelming target systems
Avoid triggering rate-based security defenses (WAF, IPS)
Ensure stable and controlled testing
Comply with target system capacity constraints
Example: Setting a rate limit of 15 requests/second ensures the scanner sends no more than 15 HTTP requests per second to the target application.
Attack Vectors
Attack Vectors define the security vulnerability categories that will be tested during your scan. Select specific vulnerability types to prioritise during assessments.
Common Attack Vector Categories:
Authentication - Tests for authentication bypass, weak credentials, and session management issues
CSRF (Cross-Site Request Forgery) - Validates anti-CSRF token implementation
SQL Injection - Detects database injection vulnerabilities
XSS (Cross-Site Scripting) - Identifies reflected, stored, and DOM-based XSS
Command Injection - Tests for OS command injection flaws
Path Traversal - Checks for directory traversal vulnerabilities
XXE (XML External Entity) - Tests for XML injection attacks
SSRF (Server-Side Request Forgery) - Identifies SSRF vulnerabilities,
Usage:
Enable all vectors for a thorough security assessment. Selecting None will also test all vectors.
Select specific vectors to focus on particular vulnerability classes
Disable certain vectors if they're not relevant to your application
Custom Headers
Custom Headers allow you to specify additional HTTP headers (key-value pairs) that will be included with every request made to the target application during scanning.
Domains
Domain Whitelist
The Domain Whitelist feature allows you to explicitly specify which domains (including subdomains) are allowed for scanning. Only whitelisted domains will be included in vulnerability tests, even if additional domains are discovered during crawling.
Key Features:
Add specific domains to allow scanning
Support for wildcard patterns
Ensures scans stay within the authorised scope
Discovered domains outside the whitelist are automatically excluded
Wildcard Pattern Examples:
example.com - Matches exactly example.com
*.example.com - Matches all subdomains (api.example.com, app.example.com, etc.)
*.dev.example.com - Matches all sub-subdomains under dev (test.dev.example.com, staging.dev.example.com)Domain Blacklist
The Domain Blacklist allows you to explicitly exclude specific domains from scanning. Any domains added to the blacklist will be completely ignored during assessments.
Key Features:
Explicitly exclude domains from scanning
Support for wildcard patterns
Overrides whitelist settings
Useful for excluding third-party services or sensitive areas
Wildcard Pattern Examples:
analytics.example.com - Blocks only analytics.example.com
*.analytics.example.com - Blocks all subdomains under analytics
*.third-party.com - Blocks all subdomains of third-party servicesImportant Notes:
Blacklist takes precedence over whitelist
Wildcards apply to all matching subdomains
Use carefully to avoid excluding critical test targets
Both whitelist and blacklist support complex wildcard patterns for flexible scope control
Last updated