Skip to content

Terra Security Commands

Overview

Terra Security is an agentic offensive security platform that combines human pentesters with AI agents to streamline penetration testing and vulnerability assessment. The platform launched Terra Portal in March 2026 and raised $30M Series A funding from Felicis, establishing itself as a leader in AI-driven security testing.

Key Features

  • Ambient AI Agents: Autonomous reconnaissance, vulnerability scanning, and exploitation validation
  • Copilot AI Agents: Human-directed controlled exploitation with real-time guidance
  • Human-in-the-Loop Governance: Security controls ensure responsible testing within defined scope
  • Automated Reporting: Comprehensive vulnerability documentation with remediation guidance
  • Enterprise Integration: CI/CD pipelines, ticketing systems, SIEM platforms

Platform Architecture

Terra Portal (Desktop/Web App)
├── Agent Management Console
├── Scope & Workflow Configuration
├── Real-time Monitoring Dashboard
├── Vulnerability Reporting Engine
└── Integration Hub

Terra Portal Setup

Installation

Desktop Application

StepAction
1Download Terra Portal from terra.security
2Run installer (Windows/macOS/Linux)
3Accept security permissions for system-level network access
4Launch and authenticate with organizational credentials
5Configure proxy settings if required

Web-Based Console

Access via: https://portal.terra.security
Authentication: SSO/OAuth or API token
Requirements: Modern browser (Chrome, Firefox, Safari, Edge)

Initial Configuration

SettingDescription
Organization SetupCreate/join organization, configure admin permissions
API CredentialsGenerate authentication tokens for CI/CD and API access
Network ConfigurationDefine internal networks, proxy settings, VPN requirements
Notification PreferencesEmail, Slack, webhook alerts for agent activity and findings
Default Agent SettingsBase configuration for Ambient and Copilot agent instances
Compliance FrameworkSelect applicable standards (OWASP, PTES, NIST)

Authentication Methods

# API Token Authentication
Authorization: Bearer YOUR_API_TOKEN
X-Organization-ID: org_xxxxx

# SSO Integration
Provider: Okta, Azure AD, Google Workspace
Auto-provisioning: Enabled/Disabled

# Service Accounts
For CI/CD: Create service account with scoped permissions
Token rotation: 90-day default interval

Agent Types

Ambient AI Agents

Autonomous agents operating within defined scope and depth parameters to continuously assess security posture.

Agent TypeCapabilities
Asset Discovery AgentNetwork reconnaissance, inventory cataloging, service identification
Code Review AgentStatic analysis, dependency scanning, secret detection
Test Case Generation AgentAutomatic test scenario creation based on discovered assets
Reachability Analysis AgentNetwork path mapping, firewall rule analysis, access control validation
Autonomous Pentesting AgentVulnerability scanning, exploitation attempts, impact validation
Documentation AgentEvidence gathering, finding validation, report generation
Remediation AgentConfiguration recommendations, patch guidance, control suggestions

Configuration Example

Ambient Agent Configuration:

  Asset Discovery:
    enabled: true
    scan_frequency: daily
    scope: internal_networks_only
    include_cloud: true

  Code Review:
    enabled: true
    repositories: auto_discover
    scan_pull_requests: true
    secret_detection: strict

  Autonomous Pentesting:
    enabled: true
    depth_level: 3
    max_impact: "informational"
    revert_changes: true
    human_approval_threshold: critical

Copilot AI Agents

Human-directed agents providing real-time assistance during controlled exploitation and manual testing.

Copilot FunctionUse Case
Exploitation GuidanceStep-by-step assistance for manual exploitation workflows
Vulnerability InterpretationExplain findings, impact assessment, exploitation prerequisites
Remediation PlanningGenerate fix strategies, patch recommendations, workaround options
Evidence DocumentationAutomated screenshot/log capture, finding validation
Reporting AssistanceReal-time report generation, executive summary creation

Copilot Interaction Workflow

1. Pentester identifies vulnerability

2. Invoke Copilot: "/assist vuln_id"

3. Copilot analyzes context:
   - Vulnerability details
   - System configuration
   - Historical data

4. Provides recommendations:
   - Exploitation steps
   - Required tools/payloads
   - Risk assessment

5. Pentester executes with guidance

6. Copilot documents findings automatically

Workflow Configuration

Scope Definition

Define the boundaries and targets for agent activity.

ConfigurationOptions
Asset ScopeIP ranges, hostnames, domains, cloud accounts, APIs
Technology ScopeWeb apps, APIs, infrastructure, cloud services, mobile
ExclusionsProduction databases, customer PII, third-party systems
Environment TaggingDev, Staging, Production, Internal, External
Regulatory ScopePCI-DSS, HIPAA, SOC2, GDPR compliance requirements

Depth & Intensity Controls

ControlPurposeLevels
Reconnaissance DepthHow thoroughly agents discover assets1-5 (1=shallow, 5=exhaustive)
Exploitation DepthHow deeply agents attempt to exploit vulnerabilities1-5 (1=detection only, 5=full compromise)
Intensity/RateQuery load and test frequencyLow, Medium, High, Custom
Time WindowsWhen agents operateAlways, Business hours, Custom schedule
Concurrent AgentsMaximum simultaneous agent instances1-50+ per agent type

Impact Controls

Governance mechanisms to ensure responsible testing.

ControlConfiguration
Auto-Revert ChangesAutomatically rollback modifications (enabled by default)
Impact ThresholdMaximum allowed disruption (info, low, medium, high)
Human Approval GateRequire approval for critical-impact actions
Automatic EscalationAlert administrators if impact exceeds threshold
Resource LimitsCPU/memory/bandwidth caps for agent activity
Rollback WindowTime to manually revert before automatic rollback

Workflow Templates

Workflow: Continuous Assessment
  Schedule: Daily (02:00 UTC)
  Agents:
    - ambient.asset_discovery (depth: 3)
    - ambient.code_review (depth: 4)
    - ambient.vulnerability_scanning (depth: 2)
  Scope: internal_networks
  Impact: low
  Approval: automated

Workflow: Quarterly Pentest
  Schedule: Quarterly
  Agents:
    - ambient.asset_discovery (depth: 5)
    - ambient.autonomous_pentesting (depth: 4)
    - copilot.exploitation (depth: 4)
  Scope: all_production_systems
  Impact: medium
  Approval: human_required
  Duration: 2 weeks

Workflow: Incident Response
  Trigger: manual
  Agents:
    - ambient.reachability_analysis
    - ambient.autonomous_pentesting (depth: 4)
    - copilot.exploitation
  Scope: affected_systems
  Impact: high (with approval)
  Approval: human_required

Reconnaissance Features

Automated Asset Discovery

AI agents automatically catalog organizational assets and attack surfaces.

Discovery MethodCoverage
Network ScanningCIDR range analysis, service enumeration, OS fingerprinting
DNS EnumerationSubdomain discovery, DNS record analysis, zone transfers
Cloud API EnumerationAWS, Azure, GCP account discovery and service mapping
Web CrawlingJavaScript rendering, hidden endpoint discovery, form identification
Certificate TransparencyHistorical domain discovery, SSL/TLS certificate tracking
WHOIS/ASN AnalysisIP ownership, autonomous system mapping, geographic analysis
Port ScanningTCP/UDP ports, service identification, version detection

Attack Surface Mapping

Discovery Output Hierarchy:

Organization
├── Networks
│   ├── Internal Networks
│   │   ├── Subnets
│   │   │   ├── Hosts
│   │   │   │   ├── Services (HTTP, SSH, DB, etc.)
│   │   │   │   │   ├── Endpoints
│   │   │   │   │   └── Technologies
│   │   │   │   └── Vulnerabilities
│   │   │   └── Relationships
│   │   └── Firewall Rules
│   └── External Networks
├── Cloud Resources
│   ├── AWS Accounts
│   ├── Azure Subscriptions
│   ├── GCP Projects
│   └── Cloud Storage
├── Web Applications
│   ├── Endpoints
│   ├── Authentication Methods
│   ├── APIs
│   └── Third-party Integrations
├── Code Repositories
│   ├── Internal repos
│   ├── Public exposure
│   └── Dependency inventory
└── Third-party Integrations
    ├── SaaS applications
    ├── API connections
    └── Data flows

Asset Inventory Management

FeatureDescription
Automatic TaggingAI categorizes assets by type, criticality, exposure level
Relationship MappingConnects assets showing data flows and dependencies
Change TrackingDetects new assets, removed assets, configuration changes
Risk ScoringAssigns risk based on exposure, vulnerabilities, criticality
Historic TrackingMaintains discovery history for trend analysis
Export CapabilitiesCSV, JSON, XLSX formats for external tools

Vulnerability Assessment

AI-Driven Scanning

Intelligent vulnerability identification combining multiple detection methods.

Scan TypeDescription
Pattern-Based ScanningKnown vulnerability signatures (CVSS, CWE databases)
Behavioral AnalysisAnomalous configuration detection, security control gaps
Dependency ScanningLibrary/package vulnerability detection with supply chain analysis
Secret DetectionAPI keys, credentials, tokens in code and configuration
Configuration AuditSecurity best practice compliance validation
Access Control ReviewExcessive permissions, unused access, segregation violations
Cryptography AnalysisWeak algorithms, certificate validation issues, encryption gaps

Vulnerability Prioritization

AI agents automatically prioritize findings based on:

Priority Score = (CVSS × Exploitability) × Accessibility × Business Impact

Factors:
- CVSS 3.1 Base Score
- Exploitability:
  * Requires network access
  * Requires user interaction
  * Requires authentication
  * Attack complexity
- Accessibility:
  * External exposure
  * Internal accessibility
  * Direct/indirect access
- Business Impact:
  * PII exposure
  * System criticality
  * Revenue impact
  * Compliance violation

Output: Critical → High → Medium → Low → Informational

Vulnerability Categorization

CategoryExamples
AuthenticationDefault credentials, weak authentication, session management flaws
AuthorizationPrivilege escalation, insecure direct object references, broken access control
Injection FlawsSQL injection, command injection, LDAP injection, template injection
Sensitive Data ExposureUnencrypted data, inadequate encryption, data leakage, PII exposure
XML/External EntitiesXXE attacks, billion laughs, external entity injection
Broken Access ControlInsecure direct object references, missing access control, path traversal
Security MisconfigurationDefault configuration, unnecessary services, verbose error messages
Insecure DeserializationObject injection, gadget chains, deserialization attacks
Using Components with Known VulnerabilitiesOutdated libraries, unpatched dependencies
Insufficient LoggingMissing audit trails, inadequate monitoring, poor alerting

Exploitation Workflows

Human-Governed Exploitation

All exploitation activities maintain human oversight and control.

Exploitation Workflow

1. Discovery Phase
   - Agents identify vulnerability
   - Assess exploitability
   - Determine prerequisites

2. Planning Phase
   - Generate exploitation strategy
   - Estimate impact
   - Identify revert steps

3. Approval Gate
   - If critical impact: requires human approval
   - If medium impact: automated approval with notification
   - If low impact: automated approval

4. Execution Phase
   - Execute exploitation steps
   - Monitor for unexpected behavior
   - Capture evidence

5. Validation Phase
   - Confirm successful exploitation
   - Document impact
   - Identify lateral movement opportunities

6. Revert Phase
   - Execute pre-planned revert steps
   - Verify system restoration
   - Clean up artifacts

7. Documentation Phase
   - Generate findings report
   - Document proof-of-concept
   - Create remediation recommendations

Safety Controls During Exploitation

ControlFunction
Pre-execution ValidationVerify target is in scope before any action
Dry-run ModeExecute exploitation logic without actual impact
Rollback PlanningPre-plan and validate revert steps before execution
Real-time MonitoringWatch system health during exploitation
Automatic HaltStop if unexpected conditions detected
Resource ThrottlingLimit CPU/network/memory consumption
Time LimitsAutomatic termination after duration threshold
Change LoggingAudit trail of all modifications
Isolation ModeOptional: isolate target during testing

Exploitation Capabilities

TypeDescription
Credential TestingDefault credential attempts, brute force with controls
Known Vulnerability ExploitationCVE-based exploits with proven success paths
Logic Flow ExploitationBusiness logic flaws, workflow manipulation
Lateral MovementPost-compromise movement with scope controls
Privilege EscalationLocal/OS-level escalation with permission validation
Data Exfiltration ValidationSimulated data access with no actual extraction
Persistence Mechanism TestingBackdoor placement validation with automatic removal

Reporting

Automated Vulnerability Reports

Terra Security generates comprehensive reports automatically throughout testing.

Report Components

SectionContents
Executive SummaryKey findings, risk overview, remediation timeline
Vulnerability DetailsFinding ID, title, severity, CVSS, description, evidence
Proof of ConceptStep-by-step exploitation walkthrough, screenshots, logs
Impact AssessmentBusiness impact, data exposure, system compromise scope
Remediation GuidancePrioritized fix recommendations, patch guidance, workarounds
Compliance MappingLink findings to standards (OWASP, PTES, NIST, PCI-DSS)
Timeline & MetricsTesting duration, coverage statistics, scope details
Management SummaryRisk timeline, vulnerability trend, metrics dashboard

Report Customization

Report Template Configuration:

  Output Formats:
    - PDF: Executive, detailed, or technical variants
    - HTML: Interactive, shareable version
    - JSON: API integration, ticketing automation
    - CSV: Bulk import to tools

  Customization Options:
    branding: organization_logo
    sections:
      - include_evidence: true
      - include_timeline: true
      - include_remediation: true
      - include_compliance: true
    recipients:
      - ciso@company.com
      - security-team@company.com
    schedule:
      - daily: summary_report
      - weekly: comprehensive_report
      - on_critical: immediate_alert

Finding Lifecycle Management

StatusDescription
OpenNew finding, not yet addressed
AcknowledgedOrganization confirmed receipt and assessed
In ProgressRemediation effort underway
ResolvedFix applied and validated
False PositiveFinding determined to be invalid, documented reasoning
Risk AcceptedBusiness decision to accept risk, signed off
DeferredAccepted but not prioritized for current timeline

Integration

CI/CD Pipeline Integration

Embed Terra Security testing into development workflows.

# GitLab CI Example
security_scan:
  stage: test
  script:
    - terra-cli scan \
        --workflow continuous \
        --scope repository \
        --report-format json \
        --output artifacts/terra-report.json
  artifacts:
    reports:
      sast: artifacts/terra-report.json
    paths:
      - artifacts/terra-report.json
    expire_in: 30 days

# GitHub Actions Example
name: Terra Security Scan
on: [pull_request, push]
jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Terra Security Scan
        env:
          TERRA_API_KEY: ${{ secrets.TERRA_API_KEY }}
        run: |
          terra-cli scan \
            --scope ./src \
            --depth 3 \
            --fail-on critical

Ticketing System Integration

Automatically create and manage security findings in issue trackers.

IntegrationFeatures
JiraAuto-create issues, assign to teams, set priority, link to epics
Azure DevOpsCreate work items, integrate with backlogs, track remediation
GitHub IssuesCreate issues, link to PRs, track resolution
LinearCreate issues with custom fields, link to projects
ServiceNowCreate incidents/change requests, incident management workflow
SlackReal-time notifications, finding summaries, remediation tracking

SIEM & Monitoring Integration

PlatformIntegration Type
SplunkIngest finding logs, create searches, alerts, dashboards
ELK StackFeed to Elasticsearch for analysis and visualization
DatadogMetrics export, APM correlation, alerting
New RelicApplication security data, vulnerability tracking
PrometheusMetrics export for security dashboards
CloudWatchAWS integration, log streaming, metric publishing

Safety Controls

Scope Enforcement

Prevent testing outside authorized boundaries.

Scope Enforcement:

  Network Scope:
    allowed_ranges:
      - 10.0.0.0/8
      - 192.168.1.0/24
    blocked_ranges:
      - 0.0.0.0/0
    enforcement: strict

  Asset Scope:
    allowed_assets:
      - tag: testing_approved
      - tag: staging_only
    blocked_assets:
      - tag: production
      - tag: customer_data
      - hostname: "*prod*"
    enforcement: strict

  Application Scope:
    allowed_apps:
      - internal_web_apps
      - staging_environments
    blocked_apps:
      - production_databases
      - customer_data_stores
    enforcement: strict

Depth Limiting

Control how deeply agents operate.

Depth LevelReconnaissanceExploitationScope
1 - LightBasic discovery, no intrusive scanningDetection onlyPre-approved assets
2 - StandardActive scanning, vulnerability identificationSafe exploitation attemptsStandard testing scope
3 - ModerateDetailed enumeration, configuration reviewLimited lateral movementExtended scope with approval
4 - AdvancedComprehensive mapping, dependency analysisAdvanced exploitation, limited persistence testingFull scope with oversight
5 - ExhaustiveComplete reconnaissance, all available techniquesFull exploitation, post-compromise activitiesMaximum scope with human approval

Impact Controls

Prevent unintended damage.

Impact Control Thresholds:

  Severity Limits:
    informational: auto_approved
    low: auto_approved
    medium: auto_approved_with_monitoring
    high: human_approval_required
    critical: human_approval_required_escalated

  System Impact Limits:
    cpu_threshold: 50%
    memory_threshold: 75%
    network_bandwidth: 50% capacity
    availability_impact: none_allowed

  Data Impact Limits:
    no_data_exfiltration: enforced
    no_permanent_changes: enforced_with_rollback
    no_credential_capture: enforced
    audit_logging: always_enabled

Human-in-the-Loop Governance

Human oversight at critical decision points.

TriggerApproval RequiredTimeline
Critical Vulnerability DiscoverySecurity team lead2 hours
High-impact ExploitationCISO or authorized delegate4 hours
Out-of-Scope Activity DetectedImmediate halt, security reviewN/A
Unexpected BehaviorAgent suspended, manual investigationN/A
Data Access AttemptBlocked, escalated immediatelyN/A
Production System TestingSecurity + Infrastructure team24 hours advance notice

Audit & Compliance Logging

Complete audit trail for compliance and investigation.

Log TypeContentsRetention
Agent ActionsEvery action taken, timestamp, result, user2 years
Finding ChangesStatus changes, assignments, comments3 years
Approval DecisionsWho approved what, when, justification3 years
Scope ViolationsBlocked activities, attempted out-of-scope actions2 years
System ChangesModifications made during testing, rollback logs1 year
Access LogsPortal access, API calls, user activity1 year

API & CLI Usage

Authentication

# Set API token
export TERRA_API_KEY="tk_your_api_token_here"
export TERRA_ORG_ID="org_xxxxx"

# Or in configuration file
~/.terra/config.yaml:
  api_key: tk_xxxxx
  org_id: org_xxxxx
  api_endpoint: https://api.terra.security

CLI Commands (Common Patterns)

# List assets
terra-cli assets list \
  --scope all \
  --format json

# Start a scan workflow
terra-cli scan start \
  --workflow continuous \
  --target 10.0.0.0/24 \
  --depth 3 \
  --agents asset-discovery,code-review

# Check scan status
terra-cli scan status \
  --scan-id scan_xxxxx

# Get findings
terra-cli findings list \
  --scan-id scan_xxxxx \
  --severity critical,high \
  --format json

# Generate report
terra-cli report generate \
  --scan-id scan_xxxxx \
  --template comprehensive \
  --format pdf \
  --output findings_report.pdf

# Approve exploitation
terra-cli exploit approve \
  --finding-id vuln_xxxxx \
  --justification "Production test window authorized"

# Manage scope
terra-cli scope update \
  --add-asset tag=testing_approved \
  --remove-range 192.168.1.0/24

# View agent logs
terra-cli logs \
  --agent-id agent_xxxxx \
  --level debug

API Endpoints (RESTful)

# Authentication
POST /api/v1/auth/token
  Request: {"api_key": "..."}
  Response: {"access_token": "...", "expires_in": 3600}

# List vulnerabilities
GET /api/v1/findings?severity=critical&status=open
  Headers: Authorization: Bearer {token}

# Create scan
POST /api/v1/scans
  Body: {"workflow": "continuous", "scope_id": "...", "depth": 3}

# Update finding status
PATCH /api/v1/findings/{finding_id}
  Body: {"status": "in_progress", "assigned_to": "user_id"}

# Approve exploitation
POST /api/v1/findings/{finding_id}/approve-exploit
  Body: {"justification": "...", "approved_by": "user_id"}

# Generate report
POST /api/v1/scans/{scan_id}/report
  Body: {"template": "comprehensive", "format": "pdf"}

# Stream agent events (WebSocket)
WS /api/v1/agents/{agent_id}/events
  Stream: {"event": "action", "action": "...", "timestamp": "..."}

Best Practices for Agentic Pentesting

Planning & Preparation

  1. Define Clear Scope

    • Document exact IP ranges, domains, and assets
    • List explicit exclusions (production DBs, customer data)
    • Specify testing windows and limitations
    • Get written authorization before testing
  2. Configure Agent Behavior

    • Set appropriate depth levels for objectives
    • Enable impact controls and rollback mechanisms
    • Configure time windows to avoid peak usage
    • Start conservative, increase depth gradually
  3. Establish Governance

    • Define approval criteria and decision-makers
    • Set up escalation procedures
    • Configure monitoring and alerting
    • Document incident response procedures

Execution

  1. Start Small

    • Begin with asset discovery agents in low-depth mode
    • Validate scope enforcement is working
    • Review findings quality and false positive rate
    • Build confidence before deeper testing
  2. Monitor Continuously

    • Watch real-time agent dashboards
    • Review findings as they’re discovered
    • Validate that agents stay within scope
    • Respond immediately to anomalies
  3. Leverage Copilots

    • Use Copilot agents for complex exploitation
    • Document guidance and recommendations
    • Capture evidence systematically
    • Validate findings before closing
  4. Manage Findings

    • Prioritize by business impact, not just severity
    • Link to business context and risk tolerance
    • Coordinate with development teams
    • Track remediation progress

Post-Testing

  1. Comprehensive Reporting

    • Generate reports at appropriate detail levels
    • Customize for different stakeholders
    • Include actionable remediation guidance
    • Schedule report distribution
  2. Remediation Tracking

    • Monitor finding status changes
    • Re-test critical findings after fixes
    • Validate compensating controls if permanent fix delayed
    • Document risk acceptance decisions
  3. Continuous Improvement

    • Analyze agent false positive rate
    • Adjust configurations based on results
    • Increase automation where stable
    • Maintain human oversight for complex decisions
    • Share learnings with development teams

Security Considerations

  1. Protect Access Credentials

    • Store API keys in secure vaults
    • Rotate credentials regularly
    • Limit token scope to necessary permissions
    • Audit API key usage
  2. Maintain Audit Trails

    • Enable comprehensive logging
    • Archive logs for compliance retention
    • Review logs periodically for anomalies
    • Integrate with SIEM for correlation
  3. Incident Response

    • Have rollback procedures for all changes
    • Document unexpected behaviors
    • Maintain contact info for emergency halt
    • Brief incident response teams on agent capabilities

Resources

Official Documentation & Community

ResourceURL
Terra Security Websitehttps://terra.security
Documentation Portalhttps://docs.terra.security
API Referencehttps://api.terra.security/docs
Community Forumhttps://community.terra.security
GitHub Integrationhttps://github.com/terra-security

Learning & Certifications

ProgramDescription
Certified Agentic PentesterOfficial certification for Terra Security platform proficiency
Agent ConfigurationTraining module for workflow and agent setup
Exploitation GovernanceBest practices for human-in-the-loop testing
Integration PatternsCI/CD, ticketing, and SIEM integration training

Blog & Articles

  • “Agentic AI in Security: The Future of Pentesting” - Terra Security Blog
  • “Balancing Automation with Human Oversight in Security Testing” - SANS Institute
  • “From Manual to Autonomous: Scaling Security Testing” - InfoSec Magazine

Last Updated: March 30, 2026 Platform: Terra Security Portal v2.0+ Focus: Agentic AI penetration testing with human governance Skill Level: Advanced