How to Write Great Pentest Notes for Better Results
How to Write Great Pentest Notes for Better Results
When you submit an application for an agentic pentest on TurboPentest, the Notes field is one of the most powerful inputs you have. It directly shapes how P4L4D1N and its agents approach your application. A few well-written sentences can mean the difference between surface-level findings and deep, business-critical vulnerabilities.
This guide covers what to include, what to avoid, and real examples you can adapt.
Why Notes Matter
TurboPentest's 15 tools run automatically against your target domain. But P4L4D1N - the AI orchestrator that conducts the actual penetration test - uses your notes to make decisions:
- Which parts of the application to prioritize
- How to authenticate and maintain sessions
- What business logic is worth testing
- Where previous issues were found
- What specific compliance requirements you care about
Without notes, the agents still run a thorough pentest. With good notes, they focus where it matters most.
Authentication Credentials
If your application requires login, provide test credentials. This is the single highest-impact note you can add.
Good format:
Even better:
Providing multiple roles lets the agents test privilege escalation - one of the most common and dangerous vulnerability classes. They can attempt to access admin endpoints using the standard user's session, test IDOR between accounts, and verify that role boundaries are enforced.
Paths and Areas of Interest
Your target URL is a domain - the starting point. But your application likely has specific areas that matter more than others. Use notes to point the agents in the right direction.
Good examples:
Business Logic Context
Automated tools find technical vulnerabilities well. Where agentic pentesting excels is in understanding business logic - and your notes are what provide that context.
Good examples:
Previous Findings and Known Issues
If you have had pentests before (with TurboPentest or elsewhere), sharing past findings helps agents dig deeper.
Good example:
Technology Stack
While the agents detect technology stacks automatically, explicit notes help them choose the right attack vectors immediately.
Good example:
Compliance Requirements
If you need findings mapped to specific frameworks, mention it.
Good example:
What to Avoid
Do not include:
- Production credentials or real customer data
- Credentials for accounts you do not own
- Instructions to test third-party services you do not control
- Requests to perform denial-of-service testing
Keep notes concise. The agents process your notes intelligently, but a wall of text with irrelevant details can dilute the important information. Focus on what makes your application unique and what you are most concerned about.
Quick Template
Here is a template you can copy and adapt:
Start Your Next Pentest
Ready to put these tips into practice? Head to Start a Pentest and use the Notes field to guide P4L4D1N toward the findings that matter most to your application.