Overview
Dreadnode is a terminal-native platform for offensive security agents — install once, drop into a TUI, run your first authorized pentest from the same place you write code.
Dreadnode is a terminal-native platform for offensive security agents. You install one binary, drop into a TUI in any project, and drive the whole workflow — running pentests, building capabilities, evaluating models, inspecting traces — from the same terminal you already work in.
What you’ll end up with
Section titled “What you’ll end up with”After the Quickstart, you have:
- a logged-in TUI with starter credits attached to your default workspace and project
- the
web-securitycapability installed and runnable against any target you’re authorized to test - a session you can replay end-to-end via
/sessions - a markdown vulnerability report in
reports/for any confirmed findings the agent produced
That’s the first-value path. Everything below extends it.
Start here
Section titled “Start here”- Quickstart — install, log in, install
web-security, run your first pentest. - Authentication — profiles, workspaces, BYOK provider keys, machine credentials for CI.
- AI Red Teaming — different audience, different flow. If you’re testing model targets, start there.
- Self-hosting — deploy the platform on your own Kubernetes cluster.
What the TUI gives you on day one
Section titled “What the TUI gives you on day one”A fresh TUI has everything needed for a useful first conversation. You can map an unfamiliar target, draft a test plan, or run a tool call against a local repo without installing anything else.
- Default tools — file read/write, shell, web search, multi-page extraction, direct fetch, and the rest of the standard pool.
- Capabilities — bundles of agents, tools, skills, and MCP servers that specialize the TUI for web pentesting, AI red teaming, network ops, or vuln research.
- Chat models — hosted Dreadnode models plus BYOK access to Anthropic, OpenAI, Google, and others.
- Traces & analysis — replay every tool call, span, and model turn for any session.
Press ? inside the TUI for live keybindings and slash-command help.