SCAFU
Started with a simple idea: bug bounty recon takes too long. Most hunters spend hours on setup before they get anywhere near a vulnerability. SCAFU turns that into seconds. You point it at a program, it spins up 75+ scanner modules across separate workers, chains their outputs together, and surfaces findings with severity scoring. The tricky part was building the orchestration layer that decides which scanners to run based on what earlier scanners found, so a subdomain discovery result triggers port scanning, which triggers service fingerprinting, which triggers vulnerability-specific checks. Each scan mode (quick recon, deep, red team, autonomous) runs a different subset of the chain.
Scan orchestration flow
Target
Selection
Recon
Analysis
Triage
Report
What I built
- Scanner orchestration engine with phased execution and dynamic module injection
- Job queue with priority scheduling, retry logic, and scan state recovery
- Real-time scan progress streamed over WebSockets
- Finding deduplication across scanner outputs with severity scoring
- WASM-compiled scanner tooling for edge execution on Cloudflare Workers
- Integration with HackerOne and Bugcrowd program APIs
Hard parts
- 75+ scanners running in parallel without blowing rate limits or memory caps
- Normalizing output formats across tools that all report findings differently
- Compiling security tools to WASM to run at the edge instead of on a fat server
- Keeping scan state consistent when individual scanner jobs fail mid-chain
- Honeypot detection so scans don't waste time on decoy targets