Built for pentesting consultancies

Retesting by hand costs you 3 hours per engagement

RiftX automates vulnerability retesting. Submit a finding, get a verified verdict with full evidence in five minutes, not thirty.

See It Retest a Real XSS

No credit card required. Set up in one session.

RiftX Dashboard showing 126 retests, 84% avg confidence, daily retest volume chart
Operational view

One screen to see every retest across every engagement your team is running.

Per Finding
6x faster

Manual: 30 min. RiftX: 5 min.

Coverage
XSS · SQLi · IDOR

CSRF, open redirects, clickjacking, and more

Accuracy
90%

reproduction accuracy across regression tests

Built by a pentester, for pentesters

Real browser execution, not static analysis

Deterministic detection first, LLM fallback only

Evidence sealed with HMAC-SHA256

The Problem

Every engagement, your team retests the same findings by hand. It costs more than you think.

That is not a pentester problem. That is a delivery capacity problem. Three hours per engagement spent on verification work that does not require human judgment.

Every engagement, the same loop: take a reported issue, reproduce it, capture proof, move on. RiftX compresses that loop without compromising the evidence your report depends on.

Engagement Volume
7-10

findings per engagement

Workflow Fit
90%

suitable for RiftX

Time Saved
25 min

per finding

Recovered Capacity
3 hrs

recovered per engagement

7-10 findings per engagement × 90% fit × 25 minutes saved per finding = 3 pentester-hours recovered per engagement.

Based on manual retest avg: 30 min. RiftX avg: 5 min. Time savings: 6x.

Based On

Manual retest avg: 30 min

RiftX avg: 5 min

Time savings: 6x faster

Internal benchmarks across regression test suite

How a 30-minute retest becomes a 5-minute verdict

Finding goes in. Verified verdict comes out. Your pentester moves on.

1

Submit Report

Via API or Dashboard

Provide the target URL and steps-to-reproduce. Payload is optional.

2

Agent Plans

Planning

Reads the reproduction steps, sets a clear verification goal, and plans how to follow it.

3

Browser Executes

Real Playwright Browser

An isolated browser follows your reproduction steps and fires signal detectors.

4

Evidence Delivered

HTTP traces, screen recording, confidence score

A verified verdict with full HTTP evidence and a screen recording, ready to include in your report.

Live Verification Flow

Routine retest moving from report to verdict

5 min avg
Step 01

Report queued

Step 02

Plan selected

Step 03

Browser executing

Step 04

Evidence sealed

Retest Log
in progress
00:00retest received from dashboard
00:24goal set: verify reflected_xss from steps
01:13browser replaying reproduction steps
03:02dialog and DOM signals captured
04:41HAR and screenshots attached
04:57verdict: Fixed. evidence sealed
Output bundleHTTP traces + recording + verdict
Coverage

The finding types that eat your retesting time

From XSS and SQLi to CSRF, clickjacking, and open redirects. The common web findings your team retests every engagement.

supported

XSS Retesting

Replays reflected, stored, and DOM XSS in a real browser. Submit steps-to-reproduce and get a verdict with dialog and DOM proof.

Dialog + DOM proof

Fixed alert() intercepted

supported

SQLi Verification

Verifies reported SQL injection findings and returns a clear verdict with response artifacts, not raw scanner output your pentester has to interpret.

Response artifact

500 syntax error observed

supported

Web Misconfigurations

Verifies CORS, HSTS, CSP, and six more header categories. Returns report-ready evidence.

Header evidence

CORS ACAO:null + credentials allowed

supported

IDOR Verification

Replays reported access control issues. Swaps the identifier, checks whether unauthorized data comes back, and returns the evidence.

Access evidence

403 → 200 unauthorized object returned

For the full technical detail on the agent loop, evidence model, and verdict logic, see the product page.

View Product Details

How the verification actually works

Deterministic signal detectors first, LLM fallback only when needed.

API Ingestion
REST API receives vulnerability report with steps-to-reproduce
Goal Setting
Reads the reproduction steps, sets a clear verification goal, and follows it
Browser Execution
Playwright sandbox runs ReAct loop: observe → detect → act → validate
Evidence & Verdict
Deterministic signal detectors first, LLM fallback, HMAC-SHA256-sealed evidence
Guardrails

Built-in Safety Limits

$5
Max Cost per Retest
20
Max Actions
30
Max LLM Calls
15 min
Max Execution Time

If a limit is hit, the retest terminates rather than guessing. The system is opinionated about staying inside a safe verification boundary.

Evidence Quality

Evidence is part of the verdict, not an afterthought

Every verification produces a sealed bundle. Your pentester reviews evidence, not assertions.

#VT-2026-0847
verified
Finding
Reflected XSS
Severity
High
Confidence
90%
Target URL
https://app.target.com/search
Parameter
q
Verdict
Not Fixed
Payload
<script>alert(document.domain)</script>
Evidence
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-Request-Id: 7f3a...
...
<div class="results">Search: <script>alert(document.domain)</script></div>
Steps to Reproduce
  1. Navigate to https://app.target.com/search
  2. Enter payload <script>alert(document.domain)</script> in the search field
  3. Observe JavaScript execution via browser dialog interception

HMAC-SHA256: a3f2...8e91. Evidence integrity sealed

Every verdict includes

Full HTTP traces

Complete request and response for every step

Screen recording

GIF of the browser executing reproduction steps

Reproduction steps

Exact steps followed, ready for your report

Integrity seal

HMAC-SHA256 hash proving evidence was not modified

Why Trust This

Built by someone who lived the retesting loop

Harshit Joshi
Founder

After years of pentesting, I kept watching senior pentesters spend hours retesting the same reflected XSS they had seen dozens of times before. The loop was identical every engagement: navigate, inject, screenshot, write it up. I built RiftX because that loop should take five minutes, not thirty.

What this is and what it is not
Verifies reported findings. Does not invent new ones.

RiftX replays the path your pentester reported. It never generates its own attack surface.

Frees your pentesters for judgment-heavy work. Does not replace them.

Retesting is the part of the job that does not require human expertise. Everything else still does.

Deterministic detection first. LLM only when needed.

Signal detectors handle known patterns. The model is fallback, not foundation.

Transparency Commitment

No client data used for model training · Isolated browser execution · Every action logged and auditable · Returns Needs Review when unsure, never guesses

Currently in private beta. Onboarding consultancies with repeatable web retesting workflows.

Private Beta

Get your pentesters out of the retesting loop

Your pentesters should be finding vulnerabilities and writing reports, not manually retesting the same XSS for the third time this month.

Limited beta spots. No credit card. Set up in one session.