How to Use BountyHunter AI

Your complete guide to finding vulnerabilities with AI-powered security scanning

Getting Started

1 Create Account

Sign up for a free account to get started. You'll get access to all basic scanning features.

  • Free tier includes 10 scans/month
  • Access to all scanner types
  • AI-powered vulnerability analysis

2 Configure Target

Enter the URL or IP address of the target you want to scan. Make sure you have permission!

Important
Only scan targets you own or have explicit permission to test.

3 Choose Scan Type

Select the appropriate scan type based on your needs:

  • Quick: Fast surface-level scan
  • Comprehensive: Full vulnerability assessment
  • SecureMCP: AI/MCP application testing

4 Review Results

Once the scan completes, review the findings with AI-enhanced analysis and remediation suggestions.

Pro Tip
Use the AI Chat feature to ask questions about specific vulnerabilities.

Running Your First Scan

Step-by-Step Guide

  1. Navigate to Scanner: Click on the Scanner tab in the navigation menu
  2. Enter Target URL: Input your target URL (e.g., https://example.com)
  3. Select Scan Type: Choose "Comprehensive" for your first scan
  4. Enable AI Analysis: Toggle the AI enhancement option for deeper insights
  5. Start Scan: Click the "Start Scan" button
  6. Monitor Progress: Watch the real-time progress updates
  7. View Results: Navigate to Vulnerabilities tab to see findings
Video Tutorial Coming Soon

Understanding Scan Results

Severity Levels

Critical

Immediate action required. Can lead to system compromise.

High

Significant risk. Should be fixed soon.

Medium

Moderate risk. Plan remediation.

Low

Minor issue. Fix when convenient.

AI Analysis Features

  • Automated vulnerability explanation in plain English
  • Business impact assessment
  • Step-by-step remediation guidance
  • False positive probability scoring
  • Related CVE identification
  • Exploit chain detection

API Integration

Integrate BountyHunter AI into your CI/CD pipeline or security automation workflow.

Authentication

curl -X POST https://api.bountyhunter.ai/v1/auth/login \ -H "Content-Type: application/json" \ -d '{"email": "your-email", "password": "your-password"}'

Start a Scan

POST /api/v1/scan/start
curl -X POST https://api.bountyhunter.ai/v1/scan/start \ -H "Authorization: Bearer YOUR_TOKEN" \ -H "Content-Type: application/json" \ -d '{ "target_url": "https://example.com", "scan_type": "comprehensive", "enable_ai": true }'

Get Scan Results

GET /api/v1/scan/{scan_id}
curl -X GET https://api.bountyhunter.ai/v1/scan/SCAN_ID \ -H "Authorization: Bearer YOUR_TOKEN"

Best Practices

Scan Scheduling

  • Run comprehensive scans during off-peak hours
  • Schedule regular scans for continuous monitoring
  • Use quick scans for rapid assessments

Permission & Ethics

  • Always obtain written permission before scanning
  • Follow responsible disclosure practices
  • Respect rate limits and server resources

Result Management

  • Prioritize critical and high severity findings
  • Verify findings before reporting
  • Track remediation progress

AI Optimization

  • Provide context for better AI analysis
  • Use AI chat for clarification
  • Review AI confidence scores

Troubleshooting

Common Issues

Scan is taking too long

Large sites or comprehensive scans can take 10-30 minutes. You can:

  • Use Quick scan for faster results
  • Limit scan scope to specific paths
  • Check your network connection
No vulnerabilities found

This could mean:

  • The target is well-secured (good news!)
  • The scan type doesn't match the target
  • WAF or security measures are blocking scans
API authentication errors

Check that:

  • Your API token hasn't expired
  • You're using the correct Authorization header format
  • Your account has API access enabled

Quick Links & Resources

Need More Help?

Check out our Scan Types Guide for detailed information about each scanner, or contact our support team at support@bountyhunter.ai