techlogia — AI and Web Development Berlin

Security & Pentest.

AI-powered security audits with SentinelClaw, our own open-source platform. Fully self-hosted on your infrastructure – GDPR, BSI Grundschutz and ISO 27001 compliant.

Penetration testing through external providers has a systemic problem: you send your vulnerabilities and your data to the auditor — and have to trust that they stay safe there. SentinelClaw solves it differently: the entire test pipeline runs on your own hardware. No data exfiltration, no VPN tunnel to the provider, no reporting via a third-party system. Open source, built by us, operated by us — or by you, your call.

We test your systems using the same methods as real attackers. SentinelClaw automates the entire process – from reconnaissance and port scans to AI-powered vulnerability analysis – while running entirely on your own hardware. No data leaves your network.

Where we typically deploy this service

01

Fully Self-Hosted Pentest

SentinelClaw runs as a Docker stack on your hardware. Scope, targets, findings — everything stays inside your network. We provide the platform, you control access. No cloud reporting, no external data flows.

02

BSI Grundschutz and ISO 27001 Reporting

Reports in the format that German compliance audits expect: vulnerabilities with CVSS scores, mappable to BSI building blocks, with remediation guidance and retest status. Directly consumable by auditors.

03

AI-Powered Vulnerability Prioritization

Local LLMs analyze scan results and prioritize by exploitability + business impact. Instead of 500 anonymous findings, you get 12 items that genuinely need attention — each with an explanation.

What sets us apart on this service

01

Open Source under MIT

SentinelClaw is open source. You can audit the code, modify it, extend it — even without us. No dependency on a closed-source vendor product.

02

Landlock-LSM Isolated

Scanner modules run in Linux Landlock sandboxes with minimal capabilities. Even if a scanner tool is compromised, the blast radius is contained to that module.

03

Repeatable, Comparable Tests

Tests are code, not click paths. You can re-run the same test six months later and see diffs — new vulnerabilities, fixed findings, regressions.

Technologies we use to build your solution

SentinelClawNmapPythonDockerLocal LLMsBSI GrundschutzISO 27001

Our open-source product for this service

sentinelclaw

Answers to the most important questions on this service

Nessus and OpenVAS are vulnerability scanners — they report anything that matches a CVE. SentinelClaw combines that with active exploit attempts (verifying whether the vulnerability is actually exploitable) and LLM-based prioritization. Result: fewer false positives, more focused reports.

For breadth, yes. For strategic depth, no. SentinelClaw reliably covers 80 % of vulnerability classes that show up in a typical audit — automated and repeatable. The remaining 20 % — business logic bugs, auth race conditions, complex chained exploits — still need an experienced pentester. We offer both.

Setup is 1–2 hours: Docker Compose stack, scope list configuration, first scan profile. First findings typically after 4–8 hours of runtime for a medium-sized infrastructure. Reports are immediately available.

Have a project?

Let's bring your idea to life together. We're happy to advise you with no obligation.

Get in Touch
Pentest & Security Audits with SentinelClaw — techlogia