NullRabbit Logo

Agentic Scanning - AI That Finds and Fixes Threats Autonomously

Defines the agentic scanning paradigm: multi-agent orchestration, adaptive intelligence, and continuous protection.

By NullRabbit Labs

Agentic Scanning

Traditional security scanners run on schedules - weekly, daily, or hourly at best. They execute fixed playbooks, produce static reports, and require manual interpretation. Agentic scanning breaks this pattern entirely.

Agentic scanning is an AI-orchestrated, continuous scanning paradigm using multiple autonomous agents that adapt their behavior based on findings and historical context. Instead of rigid scripts, agents coordinate via an orchestrator, persist learned patterns in vector memory, and adjust tactics in real-time. The system throttles safely, avoids overloading targets, and prioritizes highest-risk surfaces based on feedback loops.

For decentralized infrastructure - where validator nodes, RPC endpoints, and DePIN edge devices operate across heterogeneous environments - agentic scanning provides the continuous, adaptive protection that static tools cannot.

Architecture

Agentic scanning systems operate as a multi-agent orchestrator coordinating specialized autonomous agents. Each agent has a defined scope, maintains its own state, and shares context through a central memory store.

Core Components

Discovery Agent:

  • Seeds initial targets from known validator lists, RPC endpoints, and peer observations
  • Enriches targets with ASN, geolocation, provider data
  • Tracks network topology changes over time

Port Scanner Agents:

  • Perform continuous port scanning across target ranges
  • Use backoff strategies and target-aware throttling to avoid rate limiting
  • Detect new services immediately as they appear

Protocol Fingerprinter:

  • Upgrades open ports to detailed service fingerprints
  • Uses banner grabs, protocol-specific heuristics, and ML embeddings
  • Produces confidence scores (0-1) for each identification

CVE Correlator:

  • Maps detected services and versions to known vulnerabilities
  • Cross-references with CVE databases, vendor advisories, and exploit availability
  • Provides remediation guidance and fix availability status

Web Probe:

  • Collects HTTP/HTTPS headers, TLS certificate data, and content signals
  • Detects common misconfigurations: default pages, exposed admin panels, weak ciphers
  • Respects robots.txt and rate limits

Compliance Mapper:

  • Maps findings to control frameworks (SOC2, ISO 27001, MiCA)
  • Generates compliance gap reports for operators

The Orchestrator

The orchestrator acts as the planner and executor for all agent activity. It:

  • Plans jobs: Prioritizes scan targets based on risk signals, network role, and time since last scan
  • Balances regional queues: Distributes work across geographic regions to avoid overload
  • Tracks state: Monitors hygiene streaks, flapping events, and persistent exposures
  • Enforces policy: Applies rate limits, connection concurrency caps, and retry backoff

The orchestrator ensures agents operate within safe, legal, and non-intrusive boundaries at all times.

Vector Memory

All fingerprints, banners, and service signatures are embedded into a vector memory store. This enables:

  • Fast similarity recall: Match new findings against historical patterns
  • Deduplication: Suppress repeated alerts for known states
  • Learning: Improve fingerprint accuracy over time via reinforcement feedback

Vector memory transforms agentic scanning from reactive detection to adaptive intelligence.

Why It Matters

Static Scanners vs Agentic Scanning

FeatureTraditional ScannersAgentic Scanning
Execution ModelScheduled (weekly/daily)Continuous, event-driven
AdaptationFixed playbooksSelf-adjusting based on findings
Context AwarenessNoneHistorical memory and network topology
ThrottlingGlobal rate limitsTarget-aware backoff and regional balancing
False PositivesHigh (single-signal fingerprints)Low (multi-signal, confidence-weighted)
RemediationManual interpretationActionable suggestions with context

Static scanners operate in isolation. Agentic systems learn from every scan, building institutional memory that improves accuracy and reduces noise.

Real-World Impact

In September 2025, NullRabbit's agentic scanning system identified that 39.6% of Sui validator voting power was exposed via SSH services with known CVEs. Traditional scanners would have required manual correlation of port scans, service versions, and CVE databases - a multi-day process.

Agentic scanning completed this analysis in hours, identified concentration risks (provider clustering, version skew), and produced remediation guidance automatically. When consensus fails at ~33% voting power offline, this kind of speed matters.

Implementation Snapshot

Below is a simplified workflow illustrating how agents coordinate:

# Orchestrator loop (pseudocode)
while True:
    targets = discovery_agent.get_high_priority_targets()

    for target in targets:
        # Port scan with backoff
        open_ports = port_scanner.scan(target, throttle=True)

        for port in open_ports:
            # Fingerprint service
            fingerprint = protocol_fingerprinter.identify(target, port)

            # Check vector memory for similar patterns
            if vector_memory.is_novel(fingerprint.embedding):
                # New pattern detected
                cves = cve_correlator.match(fingerprint)

                if cves:
                    # Calculate risk and alert
                    risk = scoring_engine.compute_risk(target, cves)
                    orchestrator.alert(target, risk, cves)

            # Store in vector memory for future recall
            vector_memory.store(fingerprint.embedding, metadata)

    # Adjust priorities based on findings
    orchestrator.update_priorities(targets)

This feedback loop - scan, correlate, learn, adjust - runs continuously across all monitored infrastructure. Please note, this is garbage code!

Safety & Ethics

Agentic scanning enforces strict ethical boundaries:

  • Legal, non-intrusive probes only: Banner grabs, TLS handshakes, and metadata collection
  • Respect for operator controls: Honor robots.txt and allowlists where applicable
  • Conservative defaults: Rate limits and connection concurrency tuned to avoid impact
  • Responsible disclosure: Findings communicated privately to operators before public reporting

Automation does not mean aggression. Agentic systems prioritize ecosystem health over exhaustive coverage.

Related Research

Explore the foundations and applications of agentic scanning:

For real-world results and methodology details, see the Research Hub.

Related Research