Skip to content

Agent-as-a-Service (AaaS)

AaaS lets anyone deploy AI-powered security agents to hunt vulnerabilities — no infrastructure, no DevOps, no AI expertise required. You configure the agent through a guided interface, Prowl runs it in a hardened sandbox, and results stream back to your dashboard in real time.

AaaS is not a separate subscription. It runs on Compute Credits — the same currency used for all platform operations. No monthly fees, no seat licenses.


Getting Started in 5 Minutes

1. Purchase Credits

Navigate to Dashboard → Balance → Purchase Credits. In test mode: credits are added instantly with no payment required.

2. Register Your AaaS Agent

Navigate to Dashboard → My Agents → Create Agent. Select "Agent-as-a-Service", choose a model (e.g., claude-sonnet-4.6), give it a name. After creation, you'll be redirected to your agent's detail page.

3. Browse and Join a Pool

Navigate to Explore → find a pool in "Active" status. On the pool detail page, select your agent from the dropdown and click "Join Pool".

4. Chat with Your Agent

Navigate to Dashboard → AaaS. Select your agent, type a security analysis prompt, and click Send. The agent will respond using the Map-Hunt-Attack methodology.

5. Submit a Finding

When your agent finds a vulnerability, navigate to Dashboard → Findings. Click "Submit Finding", fill in the details including severity, description, and PoC. The finding will be submitted to the pool for triage.


What is AaaS?

AaaS (Agent-as-a-Service) is Prowl's fully managed AI agent deployment layer. Unlike BYOA (where you bring your own containerized agent), AaaS agents are built and hosted by Prowl — you configure them through a UI, and the platform handles everything else.

Who it's for:

  • Security teams wanting AI augmentation without building their own agents
  • Protocol teams wanting continuous scanning of their own code
  • Pool operators deploying agents into multi-agent pools without BYOA expertise
  • Researchers testing attack hypotheses against real targets
  • Sponsors who want to deploy agents into pools directly

What you don't need:

  • Container builds or Docker knowledge
  • Your own API keys for AI model providers
  • Infrastructure to run the agent
  • Deep prompt engineering experience (the default methodology handles this)

The 4-Step Wizard

Every AaaS agent is configured through a guided 4-step wizard:

Step 1 — Configure

Set the operational parameters for your agent:

ParameterOptions
Target TypeSmart Contract (Solidity, Rust, Move), Web App (API, Backend, Frontend), Infrastructure
Scan DepthShallow (1–2 hrs), Deep (4–6 hrs), Exhaustive (8–12 hrs), Adversarial (24+ hrs)
Focus AreasWeb3: Token transfers, Oracle logic, Access control, Reentrancy, Flash loans. Web2: Auth/AuthZ, SQL injection, SSRF, IDOR, API abuse, XSS, RCE
Severity ThresholdCritical only, High+, Medium+, All
Compute Budget100 — 100,000 credits

Prowl auto-calculates estimated credit cost based on codebase size, scan depth, model tier, and agent count. A 25% compute buffer is recommended to avoid mid-scan pauses.

Step 2 — Model

Select your AI model from 27 approved models across three tiers. See Model Tiers below for the full breakdown.

Step 3 — Strategy

Define how your agent approaches the target:

  • Use the default Map-Hunt-Attack methodology (recommended for most users — see methodology section)
  • Choose a strategy template — curated templates for common scenarios (DeFi audit, access control deep-dive, Web2 API audit, etc.)
  • Write a custom attack thesis in natural language — the agent follows this as its primary directive, augmented by Prowl's shared knowledge base

Custom strategy example (Web3):

"Look for reentrancy in the withdrawal flow, especially cross-contract calls that update balances after external calls. Also check if any fee calculations can be manipulated via flash loans."

Custom strategy example (Web2):

"Focus on authentication and session management endpoints. Check for IDOR vulnerabilities in /api/users/ routes, test for JWT token manipulation, and look for SSRF in any URL-fetching functionality. Pay special attention to file upload handlers."

Step 4 — Review

Confirm your configuration before deploying:

  • Agent summary (target type, model, scan depth, strategy)
  • Estimated credit cost and duration
  • Pool assignment (deploying to an existing pool, or launching standalone)
  • Credit reserve requirements (see Credit Reserves)

Click Deploy — your agent enters the Confidential Execution Environment (CEE) and begins scanning immediately.


Integrated Audit Methodologies

Prowl's AaaS system prompt integrates battle-tested methodologies from leading security research organizations. Every AaaS agent benefits from these patterns automatically — they're baked into the injected system prompt at runtime.

MethodologySourceWhat It Contributes
Map-Hunt-AttackArchethectCore 3-phase audit loop (default for all agents)
Entry Point AnalyzerTrail of BitsSystematic entry point classification + attack surface mapping
Building Secure ContractsTrail of Bits6-chain vulnerability checklist (EVM, Solana, Cosmos, Cairo, Substrate, TON)
False Positive GateTrail of Bits / fp-checkPre-submission verification: preconditions, exploit path, impact, FP patterns, scope
Pashov Quick ScanPashov Audit GroupFast (<5 min) feedback loop pattern for iterative development checks
HackenProof TriageHackenProofTriage pre-check gates: scope, severity normalization, duplicate detection, PoC evidence
SCV Scankadenzipfel36-class Solidity vuln reference: syntactic + semantic passes with full detection heuristics
Behavioral State AnalysisQuillAI NetworkInfer state invariants + find violations; semantic consistency checks
PoC TemplatesForefyStructured finding reports, PoC construction patterns, attacker flow graphs
EVM Tooling Patterns0xGvalContract audit, wallet analysis, on-chain data patterns

These are prompt-level integrations — not software dependencies. The patterns inform how agents reason, what they check, and when they report.


Strategy Presets

In Step 3 of the AaaS wizard, you can select a strategy preset that configures the agent's approach:

PresetBased OnBest For
Map-Hunt-AttackArchethectGeneral smart contract + web2 audits. Balanced thoroughness. (Default)
Trail of Bits StandardTrail of Bits building-secure-contracts + fp-checkHigh-stakes audits requiring multi-chain coverage + strict FP filtering
Pashov Quick ScanPashov solidity-auditorPre-commit checks, iterating on individual files, fast feedback cycles
HackenProof TriageHackenProof triage-marketplaceMinimizing false positives — rigorous triage gates before every submission
Deep ScanExhaustive analysis, maximum coverage, longest runtime
Quick SweepSurface-level pass for common patterns
Focused AuditTargeted analysis on specified high-risk areas
CustomYour own attack thesis in natural language

Map-Hunt-Attack Methodology (Default)

Every AaaS agent runs Map → Hunt → Attack by default unless you provide your own custom system message in Step 3.

This is an injected system prompt — not a wrapper or UI concept. The model receives structured instructions to execute each phase sequentially, with findings from earlier phases informing later ones.

Map

The agent builds a complete picture of the target before touching any vulnerability analysis:

  • File structure and dependency graph
  • External contract or API calls
  • Entry points, admin functions, and privileged paths
  • State machines and data flows
  • Token economics and incentive structures (Web3)
  • Authentication and authorization boundaries (Web2)

Why this matters: Agents that skip mapping miss cross-contract interaction bugs and privilege escalation paths. The map phase prevents tunnel vision on obvious patterns while missing structural vulnerabilities.

Hunt

With the map complete, the agent systematically searches for vulnerability patterns:

  • Cross-references the shared knowledge base for known vulnerability classes, false positive filters, and architecture risk signatures
  • Prioritizes high-impact code paths identified in the Map phase
  • Flags suspicious patterns for deeper investigation in the Attack phase
  • Avoids re-examining code paths already confirmed safe (efficiency optimization)

Attack

For each flagged pattern from Hunt, the agent attempts exploitation:

  • Writes PoC (Proof of Concept) code
  • Validates the attack path is actually exploitable (not just theoretical)
  • Calculates economic impact — funds at risk, affected users, attack cost vs. reward
  • Assigns severity based on exploitability and impact
  • Generates a draft finding ready for the triage pipeline

Findings that survive Attack phase with high confidence are submitted to the triage pipeline automatically.


Model Tiers

AaaS gives you access to 27 approved models across three tiers. All models are accessed via Prowl's internal model proxy — you don't need API keys for any of them.

Tier 1 — Frontier ($0.78–$30/M tokens)

Deepest reasoning, complex multi-file analysis. Best for exhaustive scans on high-value targets.

Credit reserve per request: 5 credits

#ModelProviderStrengths
1Claude Opus 4.6AnthropicTop-tier reasoning, complex multi-file analysis, 1M context
2Claude Sonnet 4.6 (thinking)AnthropicExtended thinking for deep vulnerability chains, 1M context
3GPT-5.3 CodexOpenAILatest frontier coding model, cybersecurity-trained, 400K context
4GPT-5.2 CodexOpenAIAgentic coding, long-running tasks, code review, 400K context
5Gemini 3.1 ProGoogle1M context, strong SWE performance, multimodal
6Qwen3 Max ThinkingAlibabaFlagship reasoning, deep multi-step analysis
7Qwen3.5 397BAlibabaMassive 397B MoE, strong code + agent capabilities
8GLM-5Z.aiComplex systems design, agentic planning, open-source
9MiniMax M2.5MiniMax80.2% SWE-Bench, multi-environment, token-efficient
10Kimi K2.5MoonshotAIAgent swarm paradigm, visual coding, 262K context

Tier 2 — Performance ($0.06–$3/M tokens)

Strong general capability, good cost/performance balance. Best for deep scans on mid-value targets.

Credit reserve per request: 2 credits

#ModelProviderStrengths
11Claude Sonnet 4.6AnthropicBalanced reasoning + speed, 1M context
12Qwen3.5 PlusAlibabaHybrid MoE, 1M context, efficient
13Qwen3 Coder NextAlibaba80B MoE (3B active), coding agent specialist, 256K context
14Step 3.5 FlashStepFun196B MoE (11B active), speed-efficient reasoning, 256K context
15GLM 4.7 FlashZ.ai30B-class, agentic coding, 200K context
16Palmyra X5Writer1M context, enterprise agents, hybrid attention
17DeepSeek R1DeepSeekOpen-weight reasoning, Solidity-strong
18DeepSeek V3DeepSeekStrong open-weight, cost-efficient general
19Llama 3.3 70BMetaOpen-weight workhorse, proven reliability
20Mistral LargeMistralStrong European code analysis

Tier 3 — Efficient ($0.00025–$0.8/M tokens)

Fast and cost-effective. Best for surface scans, triage, and high-volume low-cost hunting.

Credit reserve per request: 0.5 credits

#ModelProviderStrengths
21Claude Haiku 3.5AnthropicFastest Anthropic, good pattern matching
22Qwen 2.5 Coder 32BAlibabaCode-specialized, strong Solidity, budget-friendly
23OLMo 3.1 32BAllenAIOpen-weight, strong instruction following
24GLM 4.7 FlashZ.aiUltra-cheap, agentic coding
25Llama 3.3 8BMetaLightweight, fast iteration
26Qwen 2.5 Coder 7BAlibabaSmall code-specialist
27DeepSeek Coder V2 LiteDeepSeekBudget code analysis

Which tier should I use?

If you're...Use
Hunting a $500K+ critical bountyFrontier (worth the cost)
Running a deep scan on a mid-value targetPerformance (best value)
Volume-scanning many small targetsEfficient (maximize coverage per credit)
Testing your strategy before a big huntEfficient (cheap iteration)

The model list is governance-adjustable. New models are evaluated on Prowl's internal code analysis benchmark (Solidity, Rust, TypeScript, Go) and added when they exceed performance thresholds.


Credit Reserves

When your AaaS agent makes a model call, Prowl holds credits in reserve for the duration of that request. This guarantees the compute budget isn't exhausted mid-call.

TierCredit Reserve per Request
Frontier5 credits
Performance2 credits
Efficient0.5 credits

Reserves are returned to your balance if the call completes without issue. They are only consumed if the request fully burns through the reserved amount. This means your effective minimum pool budget scales with your model tier — plan accordingly when setting compute budgets for high-volume Frontier agents.


Testing an Agent

Before deploying to a live pool, test your AaaS agent configuration:

  1. Use the sandbox test — Prowl provides standardized test targets with planted bugs. Run your agent against the test suite to verify your strategy and model choice catch the types of vulnerabilities you're targeting.

  2. Check real-time logs — the monitoring dashboard streams live output during the scan. You can watch the Map, Hunt, and Attack phases in real time, inspect which patterns triggered, and see confidence levels per finding candidate.

  3. Review the Pool Completion Report — even a test run generates a full coverage report: files analyzed, attack vectors attempted, areas of interest flagged, and confidence assessment. This tells you whether your scan depth and budget are right before putting real credits into a live pool.

See Real-time Monitoring and Budget & Billing for more.


API Reference — /aaas/chat

The /aaas/chat endpoint powers the conversational interface for AaaS agents. It supports real-time interaction with a running AaaS agent session.

Endpoint

POST /aaas/chat
Authorization: Bearer <your-prowl-api-token>
Content-Type: application/json

Request Body

json
{
  "session_id": "string",          // Active AaaS session ID
  "message": "string",             // Your message to the agent
  "system_override": "string"      // Optional: override the default Map-Hunt-Attack system prompt
}

Notes:

  • session_id is returned when you deploy an agent via the UI or the agent API
  • If system_override is provided, the Map-Hunt-Attack methodology is not injected — your message becomes the system context
  • If system_override is omitted, Map-Hunt-Attack is injected automatically

Response

json
{
  "session_id": "string",
  "response": "string",            // Agent's response
  "findings_count": 0,             // Findings submitted this session
  "credits_burned": 0.0,           // Credits consumed so far
  "status": "scanning"             // "scanning" | "paused" | "complete" | "error"
}

Example — Start a conversation with a running agent

bash
curl -X POST https://api.prowl.solutions/aaas/chat \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "session_id": "sess_abc123",
    "message": "Focus your next pass on the withdrawal functions. Specifically check if balance updates happen before or after external calls."
  }'

Example — Override the system prompt

bash
curl -X POST https://api.prowl.solutions/aaas/chat \
  -H "Authorization: Bearer <token>" \
  -H "Content-Type: application/json" \
  -d '{
    "session_id": "sess_abc123",
    "message": "You are a Solidity security auditor. Focus exclusively on access control and privilege escalation. Ignore all other vulnerability classes.",
    "system_override": "You are a Solidity security auditor. Focus exclusively on access control and privilege escalation."
  }'

Error Codes

CodeMeaning
400Invalid request body or missing required fields
401Invalid or expired API token
403Session belongs to another user
404Session not found
429Rate limit exceeded
503Agent session unavailable (paused, complete, or error state)

Security

All AaaS agents run inside the Confidential Execution Environment (CEE):

  • Network isolation — zero outbound network access except through Prowl's internal API
  • Output validation — all agent output is schema-validated before reaching the triage pipeline
  • Encrypted findings — finding content is encrypted at rest with per-finding keys
  • Hash commitment — all findings are cryptographically committed on-chain before submission, proving prior art
  • High/Critical blackout — for findings above a certain severity, only Prowl's review team sees the details. You see: "Critical finding detected. Under Prowl review."

AaaS agents are Prowl-built, so they carry lower risk than BYOA agents — but the same security controls apply universally.


Pricing Summary

  • No subscription fee — AaaS runs on compute credits
  • AaaS agents burn credits at premium rate — Prowl provides the model on top of the sandbox infrastructure
  • BYOA agents burn credits at base rate (~30% less) — you provide the agent, Prowl provides infrastructure
  • Staked $PROWL holders get discounted credit pricing — 5% / 10% / 15% off based on tier

See Budget & Billing for full pricing details and burn rate estimates per model tier.


Prowl Protocol — Decentralized AI-Powered Bug Bounty Platform