Thorough (plan) mode, issues module, and the red team operator
A major release focused on how agents plan, what they remember, and the tools they carry. Agents can now think through a target before acting, track every confirmed finding in a shared database your whole team builds on, run offensive workflows with pre-loaded red team tooling, and much more.

Thorough (plan) mode
NewIntroducing a new long-running thorough (plan) mode alongside the existing fast mode. Fast mode remains the default for quick, focused, and iterative tasks. Thorough mode is for depth: the agent asks clarifying questions about your target and objectives, builds a comprehensive plan, spins up parallel sub-agents for each part of the plan, and executes end-to-end. It takes longer and uses more credits, but it is built for broad-scope reconnaissance, multi-phase penetration tests, deep reverse engineering, and large research objectives where a quick pass would miss things. Available from the mode selector in the task UI and via the API.
- The flow is: you describe the task, the agent asks follow-up questions to narrow scope and understand constraints, it produces a structured plan based on your answers and available knowledge, then it executes the plan automatically.
- During planning, the agent has full read-tool access. It can read files, search knowledge, inspect previous task results, and review project context, but it does not run active tools until the plan is ready.
- The agent creates parallel sub-agents for independent parts of the plan, so a thorough task can have multiple agents working simultaneously across different objectives. This is what makes it powerful for broad tasks, but also why it consumes more credits.
- Best suited for tasks where you would give a broad objective and expect comprehensive coverage: "audit this application," "map this network," "reverse engineer this binary and identify all vulnerabilities." Not intended for quick, narrow questions.
Issues module
NewA dedicated issues section at /issues with a persistent vulnerability database behind it. Browse, filter, and act on every finding your agents discover, with full details, timeline, and linked tasks on each issue. Agents read from and write to the same database, and they only file issues after a validation step, so the data starts clean. Every issue has two actions: "Challenge & Verify" re-tests exploitability by spinning up a new task against the finding, and "Escalate" pushes exploitation depth further, both available individually or as bulk actions.
Your feedback shapes future results. Mark something as a false positive, flag it as out of scope, or add business context, and agents carry that forward into every subsequent run. Over time, the system gets better at filtering noise, respecting your scope boundaries, and recognizing patterns you have already triaged. The same data feeds regression testing, so previously resolved issues are automatically re-checked in future tasks.
New agent tools
NewThis release adds new agent tools across planning, issue management, SSH access, and centralized network traffic analysis.
create_planask_questionGenerate executable plans with approval gates and ask users interactive questions with approve, retry, and timeout states.
list_issuesget_issue_statsget_issueget_issue_configupdate_issue_configRead issue data, stats, details, and project or team policy config.
create_issuebulk_create_issuesupdate_issuebulk_update_issuesCreate or update single and batched issue records from agent findings.
add_issue_assetadd_issue_commentget_issue_timelineAdd supporting evidence, comments, and activity timelines to issues.
ssh_configuressh_execConfigure saved SSH connections and execute commands on authorized remote hosts.
network_traffic_sitemapnetwork_traffic_searchnetwork_traffic_getnetwork_traffic_replayInspect captured HTTP traffic from browser, CLI, script, and replay sources, then retrieve or replay selected requests with preserved auth context.
Slack integration
NewSlack is now a native working surface for Neo, not just a notification channel. Connect your workspace from the integrations page with one-click OAuth, mention Neo in any channel or DM, and agents run security tasks, post concise summaries, and attach output files directly in the thread. Follow-ups maintain full thread context, so you can investigate a target, ask follow-up questions, and continue deeper work without re-explaining anything. Any request you would make in the Neo UI can be made from Slack. For setup instructions and usage details, see the Slack integration docs at https://docs.neo.projectdiscovery.io/integrations/slack.
Red Team Operator agent
NewBuilt specifically for red teaming operations. After working with multiple red teams over the past few months building custom tools and custom agents, we are releasing an official Red Team Operator agent designed to handle real-world post-exploitation workflows. It ships with nine curated offensive tools pre-installed in every sandbox (Impacket, BloodHound, NetExec, pypykatz, Hydra, John the Ripper, Kerbrute, Chisel, and Responder) and knows how to chain them strategically based on what it discovers at each step. The agent handles credential harvesting, lateral movement, privilege escalation, and domain enumeration end-to-end, pivoting between tools automatically as new information surfaces. Available in every account, all tools pre-configured and ready the moment the sandbox starts.
SSH connection support
NewConnect to remote targets over SSH directly from the sandbox using key-based or password authentication. Agents can run commands, transfer files, and inspect remote systems as part of their task workflow. Configure SSH credentials from the secrets panel at neo.projectdiscovery.io. For setup instructions and usage details, see the SSH connections docs at https://docs.neo.projectdiscovery.io/concepts/ssh-connections.
Unlisted agent share and install
NewSet any agent to unlisted visibility to share it via a private link without publishing it to the directory. Anyone with the link can install and run it. Revoke access at any time by switching visibility back to private.
GPT-5.5, Kimi K2.6, and smart model selection
NewGPT-5.5 and Kimi K2.6 are available from the model selector. Auto model selection routes each step of a task to the most suitable model based on the type of work. Multi-model support lets a parent agent and its sub-agents use different models within the same task, so you can balance cost and capability. Model preferences can be set at the project level.