We ran four frontier models through the same autonomous pentest engagement. Recall, time to finish, and dollars per run all tell different stories, and Kimi K2.6 turned out to be the surprise on the leaderboard.
A case study from an autonomous AI pentest run by KLUE. Eleven confirmed findings in just over an hour, including a blind SQL injection that led to full database takeover. A practitioner walkthrough of the discoveries, the methodology, and the takeaways.
A practical JWT security guide covering what JWT is, common JWT vulnerabilities, JWT attacks, exploit techniques, and defensive best practices for developers, pentesters, and API security teams.