Retest Commands
Every finding includes a retestCommand field - a Docker one-liner that re-runs the specific check that found the vulnerability. Use these to verify your fix before running a full pentest.
How it works
- Fix the vulnerability in your code
- Deploy the fix
- Run the retest command from the finding
- If the tool no longer reports the issue, your fix is working
Example
For a finding from Nuclei about an exposed .env file:
If the output shows no findings, the .env file is no longer exposed.
Common retest patterns
Nmap (open ports)
OWASP ZAP (web vulnerabilities)
TestSSL (TLS issues)
Gitleaks (secrets in code)
Tips
- Retest commands use the same Docker images as the full pentest
- They are scoped to the specific check that found the vulnerability
- No TurboPentest account or credit is needed to run retest commands
- All images are public and available on Docker Hub