Releases

The latest updates and improvements to Neo.

v0.8.0

Thorough (plan) mode, issues module, and the red team operator

A major release focused on how agents plan, what they remember, and the tools they carry. Agents can now think through a target before acting, track every confirmed finding in a shared database your whole team builds on, run offensive workflows with pre-loaded red team tooling, and much more.

Thorough (plan) mode, issues module, and the red team operator

Thorough (plan) mode

New

Introducing a new long-running thorough (plan) mode alongside the existing fast mode. Fast mode remains the default for quick, focused, and iterative tasks. Thorough mode is for depth: the agent asks clarifying questions about your target and objectives, builds a comprehensive plan, spins up parallel sub-agents for each part of the plan, and executes end-to-end. It takes longer and uses more credits, but it is built for broad-scope reconnaissance, multi-phase penetration tests, deep reverse engineering, and large research objectives where a quick pass would miss things. Available from the mode selector in the task UI and via the API.

  • The flow is: you describe the task, the agent asks follow-up questions to narrow scope and understand constraints, it produces a structured plan based on your answers and available knowledge, then it executes the plan automatically.
  • During planning, the agent has full read-tool access. It can read files, search knowledge, inspect previous task results, and review project context, but it does not run active tools until the plan is ready.
  • The agent creates parallel sub-agents for independent parts of the plan, so a thorough task can have multiple agents working simultaneously across different objectives. This is what makes it powerful for broad tasks, but also why it consumes more credits.
  • Best suited for tasks where you would give a broad objective and expect comprehensive coverage: "audit this application," "map this network," "reverse engineer this binary and identify all vulnerabilities." Not intended for quick, narrow questions.

Issues module

New

A dedicated issues section at /issues with a persistent vulnerability database behind it. Browse, filter, and act on every finding your agents discover, with full details, timeline, and linked tasks on each issue. Agents read from and write to the same database, and they only file issues after a validation step, so the data starts clean. Every issue has two actions: "Challenge & Verify" re-tests exploitability by spinning up a new task against the finding, and "Escalate" pushes exploitation depth further, both available individually or as bulk actions.

Your feedback shapes future results. Mark something as a false positive, flag it as out of scope, or add business context, and agents carry that forward into every subsequent run. Over time, the system gets better at filtering noise, respecting your scope boundaries, and recognizing patterns you have already triaged. The same data feeds regression testing, so previously resolved issues are automatically re-checked in future tasks.

New agent tools

New

This release adds new agent tools across planning, issue management, SSH access, and centralized network traffic analysis.

  • create_planask_question

    Generate executable plans with approval gates and ask users interactive questions with approve, retry, and timeout states.

  • list_issuesget_issue_statsget_issueget_issue_configupdate_issue_config

    Read issue data, stats, details, and project or team policy config.

  • create_issuebulk_create_issuesupdate_issuebulk_update_issues

    Create or update single and batched issue records from agent findings.

  • add_issue_assetadd_issue_commentget_issue_timeline

    Add supporting evidence, comments, and activity timelines to issues.

  • ssh_configuressh_exec

    Configure saved SSH connections and execute commands on authorized remote hosts.

  • network_traffic_sitemapnetwork_traffic_searchnetwork_traffic_getnetwork_traffic_replay

    Inspect captured HTTP traffic from browser, CLI, script, and replay sources, then retrieve or replay selected requests with preserved auth context.

Slack integration

New

Slack is now a native working surface for Neo, not just a notification channel. Connect your workspace from the integrations page with one-click OAuth, mention Neo in any channel or DM, and agents run security tasks, post concise summaries, and attach output files directly in the thread. Follow-ups maintain full thread context, so you can investigate a target, ask follow-up questions, and continue deeper work without re-explaining anything. Any request you would make in the Neo UI can be made from Slack. For setup instructions and usage details, see the Slack integration docs at https://docs.neo.projectdiscovery.io/integrations/slack.

Red Team Operator agent

New

Built specifically for red teaming operations. After working with multiple red teams over the past few months building custom tools and custom agents, we are releasing an official Red Team Operator agent designed to handle real-world post-exploitation workflows. It ships with nine curated offensive tools pre-installed in every sandbox (Impacket, BloodHound, NetExec, pypykatz, Hydra, John the Ripper, Kerbrute, Chisel, and Responder) and knows how to chain them strategically based on what it discovers at each step. The agent handles credential harvesting, lateral movement, privilege escalation, and domain enumeration end-to-end, pivoting between tools automatically as new information surfaces. Available in every account, all tools pre-configured and ready the moment the sandbox starts.

SSH connection support

New

Connect to remote targets over SSH directly from the sandbox using key-based or password authentication. Agents can run commands, transfer files, and inspect remote systems as part of their task workflow. Configure SSH credentials from the secrets panel at neo.projectdiscovery.io. For setup instructions and usage details, see the SSH connections docs at https://docs.neo.projectdiscovery.io/concepts/ssh-connections.

Unlisted agent share and install

New

Set any agent to unlisted visibility to share it via a private link without publishing it to the directory. Anyone with the link can install and run it. Revoke access at any time by switching visibility back to private.

GPT-5.5, Kimi K2.6, and smart model selection

New

GPT-5.5 and Kimi K2.6 are available from the model selector. Auto model selection routes each step of a task to the most suitable model based on the type of work. Multi-model support lets a parent agent and its sub-agents use different models within the same task, so you can balance cost and capability. Model preferences can be set at the project level.

v0.7.0

Parallel agents and DNS reconnaissance

Sub-agents now run concurrently instead of sequentially, issues get verified automatically before they reach your dashboard, and agents ship with built-in DNS tools for domain intelligence.

Parallel sub-agent execution

New

The orchestrator now parallelizes sub-agent execution for speed. Instead of running one at a time, sub-agents for reconnaissance, scanning, and validation execute concurrently, and a redesigned trace UI lets you follow each one independently. Multi-step tasks finish significantly faster without any changes to how you set them up.

  • The process preview shows a two-card layout: agent list on the left, selected agent's live output on the right. Switch between agents mid-task without losing scroll position.
  • Breadcrumbs always show the main agent and currently selected sub-agent, so you stay oriented in deeply nested agent chains.
  • Working memory and task completion counts are tracked per sub-agent, visible in the process preview.

Autonomous issue verification

New

Agents now re-test discovered issues to confirm they are exploitable before they reach your dashboard. Each verified finding includes a structured proof-of-exploit with the exact steps, payloads, and responses used. This catches false positives before they show up in your issues list, so the data you review has already passed a second check.

DNS intel tools

New

Built-in agent tools for domain reconnaissance: wildcard domain search for phishing hunts, passive DNS to surface associated and typosquat domains, and subdomain enumeration with auto-export into downstream tools. Passive DNS discovery works without generating traffic to targets, so reconnaissance stays invisible.

  • Search for domains resembling your brand across multiple TLDs in a single query using wildcard patterns.
  • Enumeration results feed directly into port scanning, service fingerprinting, or web testing tools without manual export.
  • Pagination and anchored patterns are enforced automatically to prevent runaway queries on large result sets.
v0.6.0

Ghidra agent, prompt library, and custom models

This release brings binary analysis into Neo, gives your team a shared prompt library, lets you bring your own model provider, and makes task results shareable with anyone via a link.

Ghidra reverse engineering agent

New

A dedicated sub-agent with 135+ Ghidra tools for binary analysis, decompilation, and reverse engineering. Analyze binaries through natural language: decompile, extract strings, trace control flow, identify function signatures, and map cross-references. The agent runs entirely inside the isolated sandbox with no local setup required, and files can be shared between the Ghidra agent and other sandbox agents to chain binary analysis into downstream vulnerability assessment.

  • Supports the full Ghidra toolset through natural language commands. Ask the agent to decompile a function, trace a call graph, or extract embedded strings, and it handles the Ghidra interaction.
  • Files and analysis artifacts stay inside the sandbox. No binaries leave the execution environment.
  • Chain results into other agents. The Ghidra agent can hand off decompiled output to a vulnerability analysis agent within the same task.

Prompt library

New

Save, search, and share prompts across your team. Type / in the chat to find and insert a prompt inline. Fork any prompt to create your own variation when a teammate has a good base but you need to adjust the scope or technique. Prompts are searchable by title and content, scoped to your team.

Bring-your-own model providers

New

Add your own API keys for Google Vertex AI, Amazon Bedrock, or Vercel. Keys are available to all team members once configured. The model list updates dynamically based on which providers your team has enabled, so you only see models you can actually use. Usage tracking works the same regardless of provider. This is an enterprise feature. Contact your sales representative or account engineer to enable it.

Shared task view

New

Share task results via a public link. The recipient sees the full conversation, file outputs, and metadata in a clean read-only view with no Neo account required. All tool renderers work in the shared view: browser screenshots, mermaid diagrams, working memory blocks, and subdomain results render as expected. Secrets and private files are automatically redacted.

v0.5.0

Teams, local browser, and VPN

Neo is now multi-player. This release introduces team workspaces with role-based access, a local Chromium browser in every sandbox for offline and locally deployed targets, VPN connectivity for reaching internal networks, and visibility into how your team uses credits.

Team workspaces

New

Create a workspace with role-based access, shared tasks, shared secrets, and a single environment everyone works from. Invite members by email or enable auto-join for anyone with a verified company domain. Three roles control access: admins manage billing and settings, members run tasks and manage secrets, viewers observe task output without modifying anything.

  • Tasks, secrets, and agent configurations are scoped to the team by default, so everyone sees the same environment without duplicating setup.
  • Auto-join eliminates manual approval for colleagues on the same company domain.
  • Workspace-level settings apply to all members. Individual preferences layer on top without overriding team defaults.

Local Chromium in sandboxes

New

Every sandbox now ships with a local Chromium browser. For offline testing, locally deployed applications, or targets that need to be accessed without leaving the sandbox network, agents can use the built-in browser to navigate pages, fill forms, take screenshots, and interact with web applications directly inside the execution environment. No external browser service required.

Credits and usage dashboard

New

The usage dashboard breaks down credit consumption by task, model, and agent, with date range filtering and per-task drill-down. Team-level tracking lets admins spot trends and manage spend across the organization. Credit balance and remaining allocation are visible at a glance from the settings page.

VPN for sandboxes

New

Connect sandboxes to internal networks via VPN so agents can reach private hosts, staging environments, and network segments that are not publicly accessible. VPN sessions are scoped to the sandbox lifecycle: established on sandbox start, torn down when the task ends. Configure VPN connections from the secrets panel using standard credentials.

v0.4.1

Sandbox hardening, new models, and credits

Sandboxes are more reliable and isolated, new models from Anthropic are available across all tiers, and credits validation ensures tasks stay within budget.

Sandbox user separation

Improvement

Each sandbox now enforces process-level user isolation. Agent processes run under a dedicated user context, preventing cross-task interference and ensuring file permissions are scoped correctly. This also fixes edge cases where stale file locks or lingering processes from a previous task could affect the next one.

  • Sandboxes automatically clean up stale SQLite entries and file tracking state on restart.
  • Auto-recovery detects and rebuilds corrupted sandbox databases without manual intervention.
  • Leaked sandbox detection and cleanup runs on a schedule, reclaiming resources from orphaned environments.

Sonnet 4.6 and Opus 4.6

New

Sonnet 4.6 is now available for all user tiers, and Opus 4.6 is available with tag-based model access. Both models support Anthropic prompt caching, which reduces latency and cost on repeated tool calls within the same task. Model access is controlled via user tags set by admins.

Credits validation

New

Tasks now check credit balance before execution and at each step. If your balance is insufficient, the task stops cleanly with a clear message instead of failing mid-run. Per-task usage breakdowns in the usage dashboard show exactly where credits were consumed.

Agent delegation

Improvement

The main agent can now suggest and delegate work to specialized sub-agents mid-task. When the main agent encounters a problem that would be better handled by a different agent (browser analysis, file operations, network scanning), it proposes the delegation and transfers context automatically.

In-chat integrations UI

New

Configure and manage connector integrations directly from within the chat interface. Link external services, set tool permissions, and check connection status without leaving the task view.

v0.4.0

API keys, working memory, and knowledge tools

This release focuses on how agents remember, learn, and connect to external services. Agents now carry working memory across steps, search and index knowledge within sandboxes, and connect to external tools via MCP.

Working memory

New

Agents now maintain structured working memory that persists across steps within a task. Instead of losing context as conversations grow, agents track key findings, decisions, and intermediate results in a memory block that stays accessible throughout the entire run. This is particularly important for long-running tasks where early discoveries inform later decisions.

  • Working memory is visible in the process preview, so you can see exactly what the agent is tracking at any point during the task.
  • Agents update their memory as they go: adding new findings, removing outdated assumptions, and reorganizing priorities based on what they learn.
  • Sub-agents inherit relevant memory from the parent agent and can contribute their own findings back.

Knowledge search and indexing

New

Agents can now search and index files within the sandbox as structured knowledge. Upload reference material, previous reports, or target documentation, and agents query it during tasks to make better-informed decisions. Knowledge is scoped to the sandbox and available to all agents operating within it.

  • Index any file in the sandbox workspace. The indexing service processes documents into searchable chunks.
  • Agents use knowledge search automatically when they need context about a target, previous findings, or reference material.
  • Useful for providing agents with scope documents, architecture diagrams, or prior engagement reports as background context.

Neo API keys

New

Generate API keys directly from Neo to authenticate programmatic access without depending on a third-party auth provider. API keys work with the full REST API for task creation, status polling, and result retrieval.

Connector agents (MCP)

New

Connect external tools and services to Neo via the Model Context Protocol. Connector agents bridge MCP-compatible servers into the sandbox, giving agents access to external APIs, databases, and custom tooling as native tools during task execution.

Tool repair

Improvement

When an agent tool call fails due to a malformed input or schema mismatch, the tool repair processor automatically corrects the call and retries. This reduces task failures from transient tool errors without requiring manual intervention.

Secret redaction

Improvement

Secrets used during task execution are now redacted at the tool level before being stored or displayed. This applies to all output surfaces: task history, shared views, and streamed responses. Redaction is automatic and requires no configuration.

v0.3.1

Scheduled tasks, sharing, and the agent directory

The first major release of Neo. Agents can now run on a schedule, task results are shareable via public links, and a directory of community-built agents is available to install and use.

Scheduled tasks

New

Set any task to run on a recurring schedule. Define the frequency, and Neo executes it automatically with the same agent configuration, secrets, and scope each time. Useful for continuous monitoring, periodic reconnaissance, or regression testing against targets that change frequently.

  • Schedules are managed from the task UI. Set a cadence, and the task runs unattended at the configured interval.
  • Each scheduled run produces its own task history entry, so you can compare results across runs and spot changes over time.
  • Schedules respect the same secrets and configuration as manual runs. No separate setup required.

Shared task view

New

Share any completed task via a public link. The recipient sees the full conversation, tool outputs, and file artifacts in a read-only view. Secrets and sensitive content are automatically redacted before sharing.

Agent directory

New

Browse and install community-built agents from the public directory. Each agent comes with a description, pre-configured tools, and a system prompt tuned for a specific workflow. Install an agent and it is ready to use in your next task.

Mermaid diagram rendering

New

Agents can now generate Mermaid diagrams inline during tasks. Architecture maps, flow charts, mind maps, and sequence diagrams render directly in the conversation and are exportable as images.

File management in sandboxes

New

Browse, upload, download, and edit files inside sandboxes directly from the task UI. The file navigator supports search, inline editing, and handles large file counts without freezing.

Mobile UI

New

The entire task interface, including the chat, process trace, file navigator, agent directory, and schedules, now works on mobile. Layout, padding, and navigation have been rebuilt for smaller screens.

v0.3.0

Agent directory, knowledge base, and native PD tools

Agents now have persistent memory, a searchable knowledge base, and access to native ProjectDiscovery tools with auto-injected credentials. This release also introduces the public agent directory and task sharing with automatic secret redaction.

Agent directory

New

Browse, share, and install agents from a public directory. Create your own agent with a custom system prompt and tool configuration, then publish it for others to use. Agents can be shared as unlisted (private link) or listed in the public directory. Installing an agent makes it available in your task UI immediately.

  • Each agent in the directory includes a description, the tools it uses, and the model it runs on.
  • Fork any public agent to create your own variant with modified instructions or tools.
  • Agents you install appear in your agent selector and can be used in any new task.

Knowledge base

New

Upload documents, reports, and reference material into a searchable knowledge base. Agents query the knowledge base automatically during tasks to inform their approach with target-specific context, prior findings, or scope documentation. Knowledge is indexed and available across tasks.

  • Supports any text-based file format. Documents are chunked, indexed, and made searchable.
  • Agents decide when to search knowledge based on the task context. No manual prompting required.
  • Useful for providing agents with engagement scope, architecture documentation, prior vulnerability reports, or custom rule sets.

Native ProjectDiscovery tools

New

ProjectDiscovery Cloud Platform tools are now natively available inside every sandbox with auto-injected API credentials. Agents can run subdomain enumeration, port scanning, and vulnerability scanning through PDCP without manual API key configuration.

Memory recall

New

Agents can recall relevant context from previous tasks. When starting a new task, the agent searches past conversations and findings for relevant information, so repeated work against the same target builds on prior knowledge instead of starting from scratch.

Task sharing and redaction

New

Share completed tasks via a public link with automatic secret redaction. All sensitive values, API keys, credentials, and redact phrases are stripped from the shared view before anyone sees it. The shared view includes the full conversation, tool outputs, and file artifacts in a clean read-only format.

GPT-5.1 and Haiku 3.5

New

GPT-5.1 is available from the model selector. Haiku 3.5 is available as a fast, cost-efficient option for chat mode and lightweight tasks.

v0.2.1

Dynamic sub-agents, chat mode, and new models

Agents can now create specialized sub-agents on the fly, tasks can be aborted mid-run, and a lightweight chat mode is available for quick questions that do not need a full sandbox. OpenRouter models are now supported alongside the existing providers.

Dynamic sub-agents

New

The main agent can now spawn specialized sub-agents during a task based on what it discovers. Instead of relying only on pre-configured sub-agents, the orchestrator creates new ones with custom tool sets and instructions tailored to the specific problem at hand. This means the agent adapts its approach as the task unfolds rather than following a fixed plan.

  • Sub-agent working memory is visible in the process trace. Each sub-agent tracks its own findings, and the main agent can access them to inform decisions.
  • Sub-agent limits and step counts are configurable. Complex tasks can run deeper analysis by allowing more steps per sub-agent.
  • The original user message is injected into each sub-agent context, so they stay aligned with the task objective even when working on a narrow sub-problem.

Task abort

New

Stop any running task cleanly from the UI. The abort signal propagates to the sandbox and all active sub-agents, terminating processes and releasing resources. Aborted tasks retain their conversation history and any files produced up to that point.

Chat mode

New

A lightweight conversation mode for quick questions that do not need a full sandbox session. Chat mode uses a fast, cost-efficient model for general questions, research, and planning without spinning up infrastructure. Switch between chat and task mode depending on what you need.

OpenRouter models

New

Models from OpenRouter are now available in the model selector. Access Grok 4 Fast, Kimi K2, and other models through a single integration. Model availability updates as OpenRouter adds new providers.

Web research tools

New

Agents can now perform web searches and analyze web images as part of their workflow. The web research tools let agents gather open-source intelligence, check for public disclosures, and pull context from documentation without leaving the task.

Recoverable sandboxes

Improvement

Sandboxes now recover automatically from transient infrastructure failures. If a sandbox process crashes or loses connectivity, it restarts and restores state without failing the task. This eliminates a class of task failures that were caused by infrastructure, not by the agent.

v0.2.0

Sandbox security toolchain, browser agent, and sub-agents

The foundational release of Neo. Every task runs inside an isolated sandbox pre-loaded with security tools, agents can browse the web and interact with applications, and a multi-agent architecture lets specialized sub-agents handle different parts of a task concurrently.

Sandbox with security toolchain

New

Every task runs in an isolated sandbox pre-loaded with a comprehensive security toolchain. Nuclei, nmap, curl, sqlmap, masscan, ffuf, and ProjectDiscovery tools are installed and available out of the box. Agents use these tools directly through natural language without any setup, and all execution stays contained within the sandbox boundary.

  • The sandbox includes a full Linux environment with Python, Node.js, and shell access. Agents can write and execute scripts, install additional packages, and chain tool output into downstream analysis.
  • File system, network access, and process execution are all scoped to the sandbox. Nothing leaks between tasks or between users.
  • Sandboxes are persistent within a task session. Agents can return to files, check running processes, and pick up where they left off.

Browser agent

New

A dedicated browser agent can navigate web applications, interact with pages, extract endpoints, take screenshots, and capture network requests. The browser runs in a remote session and the agent operates it through structured tools for clicking, typing, navigating, and extracting content.

  • Browser sessions are persistent within a task. The agent can navigate across pages, maintain cookies and session state, and return to previously visited URLs.
  • The browser_extract_endpoints tool automatically discovers API endpoints, form actions, and JavaScript-initiated requests from any page.
  • Screenshots are captured and stored as task artifacts, available in the conversation and in the shared task view.

Sub-agent architecture

New

Tasks run through a multi-agent system where a main orchestrator delegates work to specialized sub-agents. Dedicated agents handle reconnaissance, browser interaction, sandbox operations, and vulnerability verification. Each sub-agent has its own tool set and context optimized for its specialty.

XSS and OAST verification tools

New

Agents ship with dedicated tools for XSS vector testing and out-of-band (OAST) interaction verification. The XSS agent uses a curated knowledge base of context-aware payloads, and OAST tools confirm blind vulnerabilities through callback detection.

OpenAPI and MCP tool support

New

Agents can consume OpenAPI specifications and MCP servers as tool sources. Point an agent at an API spec or MCP endpoint and it gains access to every operation defined in it, with authentication support for protected APIs.

v0.1.2

Cloud sandboxes, XSS verification, and Gemini 2.5 Pro

Sandboxes move to dedicated cloud infrastructure for better isolation and reliability, agents gain specialized tools for XSS and out-of-band vulnerability verification, and Gemini 2.5 Pro joins the model lineup.

Cloud sandboxes

Improvement

Sandboxes now run on dedicated cloud infrastructure instead of shared compute. Each sandbox gets its own isolated environment with dedicated resources, persistent storage, and no time-to-live limits. This means longer-running tasks complete without being interrupted, and sandbox performance is consistent regardless of platform load.

  • Sandboxes persist across task steps. The agent can return to a running process, check file output, and continue work without losing state.
  • Sandbox startup is faster with optimized container images that pre-load the security toolchain.
  • Node.js and npm are now available in every sandbox alongside Python, expanding the scripting options agents can use.

XSS and open redirect verification

New

A dedicated verification flow for XSS and open redirect vulnerabilities. Instead of reporting potential injection points, agents now attempt to confirm exploitability by testing context-aware payloads against the target. Verified findings include the payload used and the response that confirmed the vulnerability.

OAST and out-of-band testing

New

Agents can now confirm blind vulnerabilities using out-of-band application security testing (OAST). Callback-based detection verifies that payloads triggered execution on the target, even when the response itself does not reveal the vulnerability. Essential for blind SSRF, blind XXE, and similar classes.

XSS knowledge search

New

A curated knowledge base of XSS vectors indexed by injection context. Agents search this knowledge base to find payloads appropriate for the specific context they encounter (attribute, script block, event handler, URL parameter), rather than trying generic payloads.

Gemini 2.5 Pro

New

Gemini 2.5 Pro is available from the model picker. GPT-5 High is also now available as a higher-capability variant of GPT-5 for tasks that benefit from deeper reasoning.

Resumable task streams

Improvement

If your browser disconnects or you navigate away during a running task, you can return and the stream resumes from where it left off. No output is lost, and the task continues running in the background regardless of your connection.

v0.1.1

GPT-5, model picker, and realtime sandbox logs

GPT-5 is available from a new model picker, sandbox output streams in real time, and agents handle longer tasks with a rolling context window that preserves the most relevant information.

GPT-5 and model picker

New

GPT-5 is available as a model option. A new model picker in the task UI lets you choose which model to use before starting a task. Your selection is remembered across sessions. Models can be switched between tasks based on the complexity of the work.

Realtime sandbox logs

New

Sandbox tool output now streams to the UI in real time. Instead of waiting for a tool to finish before seeing output, you can watch command execution, scan progress, and script output as it happens. This is especially useful for long-running tools like nuclei scans or network enumeration where you want to see results as they come in.

Summarizing agent

New

A dedicated summarizing agent processes sub-agent output into concise, structured summaries. When a sub-agent completes its work, the summarizer extracts key findings, strips noise, and presents results in a format the orchestrator can act on efficiently.

Rolling context window

Improvement

Agents now manage long conversations with a rolling context window that keeps the most relevant recent messages and compacts older ones. This prevents context overflow on long-running tasks and lets agents maintain coherence across many steps without losing track of important findings.

Environment variables and secrets

New

Set environment variables that are injected into the sandbox at runtime. API keys, tokens, and credentials are available to agents and tools without hardcoding them in prompts. Variable keys are included in the agent context so it knows what credentials are available.

PDF and file support

Improvement

Agents can read and analyze PDF files uploaded to the sandbox. The UI renders file previews inline, supporting PDFs, images, and code files with syntax highlighting. Larger file uploads are now supported.

v0.1.0

Neo is live

The first release of Neo. An autonomous security agent that runs inside an isolated sandbox with a full security toolchain, takes natural language instructions, and executes multi-step security tasks end-to-end.

Sandbox agent

New

Every task runs inside an isolated sandbox with shell access, Python scripting, and a pre-installed security toolchain including Nuclei and ProjectDiscovery tools. Describe what you want in natural language, and the agent plans and executes the work autonomously, running tools, writing scripts, and analyzing output step by step.

  • The agent has full shell access inside the sandbox. It can run commands, pipe output between tools, write and execute Python scripts, and install additional packages as needed.
  • ProjectDiscovery tools (nuclei, httpx, subfinder, naabu, and others) are pre-installed and available on PATH. The agent uses them as part of its workflow without any setup.
  • File artifacts produced during the task (reports, screenshots, scan output) are stored and accessible from the conversation.

Agent swarm

New

Tasks are handled by a multi-agent swarm where a main orchestrator delegates work to specialized sub-agents. Each sub-agent has a focused role and tool set. The orchestrator decides which agent to invoke based on the task requirements, and sub-agents pass results back for the orchestrator to synthesize.

File management

New

Agents can list, read, write, and edit files inside the sandbox. File artifacts are stored in the cloud and available for download from the conversation. The UI shows file previews inline, including document previews and code with syntax highlighting.

Web search

New

Agents can search the web as part of their workflow. Useful for CVE research, checking public disclosures, finding documentation, and gathering open-source intelligence about a target.

Custom instructions

New

Provide custom instructions that persist across tasks. Use them to set scope boundaries, preferred tools, output format preferences, or target-specific context that the agent should always consider.