Frequently Asked Questions

Detailed answers before your first scan and rollout.

How quickly can we start using Silent Bolt?

Most teams launch their first scan within minutes after defining domain scope. No agent deployment is required.

Will scanning disrupt production systems?

Silent Bolt uses safe active techniques and scope-controlled profiles. You can choose conservative or deep analysis modes.

What targets can be scanned?

HTTP/HTTPS web applications, APIs, single-page apps, admin panels, and common CMS platforms can be assessed.

How is this different from a single scanner?

Silent Bolt orchestrates multiple tools, correlates findings with AI, prioritizes risk, and produces report-ready output.

Can I use my own AI provider?

Yes. You can work with your preferred provider configuration while preserving operational control and auditability.

Are reports client-ready?

Yes. Reports include executive summaries, criticality grouping, evidence, reproduction steps, and remediation guidance.

Is multi-tenant isolation supported?

Yes. Workspaces are isolated per customer or department, with role-based access and separated reporting context.

Can findings be routed to collaboration tools?

Yes. Integration workflows can push alerts and issues to external systems such as Teams, Telegram, GitHub, and Jira.

How do you handle data security?

Communication is protected with TLS and workflows are tracked with auditable logs. Access is controlled per workspace.

Can we track progress over time?

Yes. Drift-aware comparisons and risk scoring help teams monitor change between scans and focus on new critical issues.