Scope Configuration¶
Scope configuration tells Revelion exactly what to test and what to leave alone. A well-defined scope keeps the agent focused, prevents unintended actions against out-of-bounds systems, and ensures your results are relevant.
Target Types¶
Revelion accepts four target types when creating a mission:
| Type | Example | Notes |
|---|---|---|
| Web Application | https://app.example.com |
Full URL including scheme |
| API Endpoint | https://api.example.com/v2 |
REST or GraphQL base path |
| IP Address | 192.168.1.10 |
Single host |
| Network CIDR | 10.0.0.0/24 |
Requires Network scan mode |
Enter one primary target per mission. For broader coverage across multiple targets, create separate missions or use the Scheduled Scans feature to run them automatically.
Scope Boundaries¶
In Scope¶
Everything reachable from the primary target is considered in scope by default. This includes:
- Subdomains discovered during reconnaissance (web mode)
- Open ports and services on the target host (network mode)
- Linked pages and API routes crawled from the entry point
Out of Scope¶
You can restrict what Revelion tests by defining exclusion patterns. Common use cases:
- Exclude third-party services embedded in your app (payment processors, analytics)
- Protect production databases or admin interfaces during a dev-environment test
- Limit testing to specific paths or IP ranges
Exclusion Patterns¶
Exclusions are entered as path patterns or IP expressions during mission setup.
Path exclusions (web mode):
Host/IP exclusions (network mode):
Patterns support * as a wildcard. Paths are matched against the full URL after the hostname. IP ranges use dash notation.
Legal Responsibility
Only test systems you own or have written authorisation to test. Revelion is a powerful autonomous agent — running it against systems without permission may violate computer misuse laws in your jurisdiction. Always obtain explicit written consent from the system owner before starting a mission.
Aggression Levels¶
Revelion offers three scan modes that control depth, duration, and the intensity of testing activity:
Quick¶
- Duration: ~15–30 minutes
- Lightweight reconnaissance and passive analysis
- Minimal active exploitation attempts
- Suitable for rapid triage or CI/CD integration
Standard¶
- Duration: ~1–2 hours
- Full reconnaissance, active vulnerability testing, and exploitation attempts
- Balanced coverage without exhaustive brute-force
Deep¶
- Duration: several hours (target-dependent)
- Exhaustive testing across all discovered attack surface
- Aggressive payload delivery, chained exploitation, and post-exploitation steps
- Recommended for pre-release or compliance-driven assessments
Credit Usage
Deeper scan modes consume significantly more credits. Check your credit balance before starting a Deep scan. See the Pricing page for credit details.