Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
EXPOSURE DISCOVERY ENGINE · TOXIC COMBINATION DETECTION · ATTACK PATH ANALYSIS

Security tools see issues.Attackers see paths.Spakto sees both.

The Exposure Discovery Engine continuously analyzes your entire environment — identity, cloud, endpoints, and network — to discover toxic risk combinations and real, exploitable attack paths that no scanner, audit, or SIEM can surface.

What is the Exposure Discovery Engine

Individual findings are noise.
Combined exposures are risk.

A single over-privileged identity isn't a breach. A misconfigured S3 bucket alone isn't a breach. But chain them together with a stolen credential and a database endpoint — that's a complete attack path. The Exposure Discovery Engine finds these toxic combinations before attackers do.

Traditional Scanner — Alert StreamNO CONTEXT
0+ FindingsNo Priority ContextNo Chain Awareness
Exposure Discovery Engine — Chain ViewCLICK NODE TO TRACE
4 Findings Chained1 Critical PathDB Takeover Risk
Cross-domain path discovery
Identity → Cloud → Endpoint → Crown Jewels
Toxic combination detection
Surfaces 3% of exposures driving 80% of risk
Real-time graph updates
Recomputes paths on every config change
Analysis Coverage

Every layer.
Every relationship.

The Exposure Discovery Engine ingests and models six layers of your environment simultaneously — mapping every relationship that could contribute to an exploitable attack path.

Identity & Access2,847 ENTITIES

Every identity and its privilege chain — from AD users to IAM roles to OAuth tokens.

AD Users & Groups
Nested memberships, shadow groups
IAM Roles & Policies
Cross-account trust, wildcards
Service Accounts
K8s, GCP, Azure managed identities
Federated Identities
SAML, OIDC, OAuth 2.0 flows
API Keys & Tokens
Long-lived credentials, rotation
27,183 total entities modeled across 6 layers — updated continuously as environment configuration changes
Toxic Combination Detection

This is what attackers
actually look for.

Attackers don't exploit individual vulnerabilities — they chain combinations. Each finding below looks low-severity alone. Together they form a verified breach path.

Cloud IAM ChainDeveloper phish → DB takeover
RISK SCORE: 94TARGET: Production Database
Individual Findings — Isolated View
MED
Finding A

Developer account — MFA not enforced

HIGH
Finding B

Developer IAM role has access to prod S3

HIGH
Finding C

Prod S3 contains .env with DB credentials

Combined Attack Path — EDE View
Analyzing combinations...
0 of 3 findings correlated
How the Exposure Discovery Engine Works

From environment data
to ranked attack paths.

Step 1 of 5

Discover

Enumerate every entity across all layers

  • Connects to identity providers: AD, Azure AD, Okta, LDAP
  • Ingests cloud accounts: AWS, Azure, GCP (read-only API)
  • Pulls endpoint telemetry: CrowdStrike, SentinelOne, Defender
  • Maps network topology from firewall APIs and flow logs
ede — step-1-discover
Risk Prioritization

Fix the 3% that creates
80% of your risk.

Traditional vulnerability management floods teams with thousands of uncontextualized findings. The Exposure Discovery Engine surfaces only the paths that matter — ranked by actual exploitability.

Exposure Scatter — All FindingsHOVER CRITICAL PATHS
Severity Score →Blast Radius →
97% — Low-priority noise3% — Critical attack paths
Exploitability Score94

Real attack path probability based on live configuration — not theoretical CVE severity. A CVSS 9.0 with no viable path ranks below a CVSS 4.0 with a proven chain.

Blast Radius78

Number of assets compromised if the path is fully exploited. Paths to domain controllers or production databases rank higher than paths to isolated dev systems.

Crown Jewel Proximity61

Attack path hops from the entry point to your most critical assets. Paths one hop from a production database are critical; five hops away may be acceptable risk.

Final Risk Score Formula
Score = (Exploitability × 0.5) + (BlastRadius × 0.3) + (Proximity × 0.2)
Who uses the Exposure Discovery Engine

Built for teams who need
answers, not more findings.

Whether you're hunting for real attack chains, prioritizing remediation, or reporting exposure to the board — the Engine gives each team exactly the context they need.

Red teams waste time on dead-end paths. The Exposure Discovery Engine pre-maps every viable attack chain across the full environment — so you enter every engagement knowing exactly which three paths lead to the crown jewels.

Pre-mapped
attack chains before engagement
Full env
coverage, not just current target
MITRE
ATT&CK aligned path evidence
Export
findings to pentest reports
  • Pre-enumerate all viable attack paths before the engagement begins
  • Validate finding chains automatically across full environment scope
  • MITRE ATT&CK technique mapping for every path step
  • Export full chain evidence directly to pentest report format

We walk into every engagement knowing the three paths that lead to domain admin. Game changer.

Principal Red Team Operator, Fortune 500 Consulting
ATTACK GRAPH EXPLORER · LIVE PATH TRAVERSAL VISUALIZER

Every exposure mapped as
a traversable attack graph.

The engine builds a live property graph of your environment — identities, hosts, cloud resources, network paths — and computes all attacker-traversable routes to crown-jewel assets. Select a path or node below to trace the risk chain.

Entry Point
Identity
Host
Cloud
Crown Jewel
spearphishmacro execcred dumpGenericAllDA → DBInternetExternal AttackerPhish EmailInitial AccessWS-01Developer EndpointWS-02IT Admin Hostsvc-backupAD Service AccountDC-01Domain Controllers3://configAWS S3 BucketPROD-DBCrown Jewelk8s-node-03Container HostMgmt VPNNetwork Access
Attack Paths to Crown Jewels
Graph Statistics
Total Nodes10
Total Edges12
Critical Paths4
Crown Jewels2
LIVE EXPOSURE SIGNAL STREAM · CORRELATION ENGINE

Raw signals in.
Correlated exposures out.

The engine continuously ingests signals from every source — AD, cloud IAM, EDR, network — and runs correlation logic to surface toxic combinations that no single source can see alone.

RAW SIGNAL INGESTION
0 signals
Waiting for signal stream…
CORRELATE
EXPOSURE CORRELATION ENGINE0 exposures found
Engine idle — no correlations yet…
Active Directory
AWS IAM
Azure AD
GCP
EDR / XDR
Kubernetes
Network
SIEM
BLAST RADIUS CALCULATOR · CROWN JEWEL EXPOSURE ANALYSIS

Select an asset. See every
path that reaches it.

For any crown-jewel asset, the engine computes all exploitable inbound paths, minimum hop distance, entry-point origin, and the precise remediations that would reduce the most attack surface.

100Blast Radius Score94% identity exposure
Attack Paths47
Entry Points12
Min Hops2
Top Attack Paths → Domain Controller · DC-01
via Identity
3 hops87% probability
Phish → WS-01 → svc-backup → DC-01
via Credential
3 hops61% probability
RDP brute → WS-02 → Pass-Hash → DC-01
via Network
4 hops54% probability
CVE-2023 → k8s escape → VPN pivot → DC-01
via Cloud IAM
2 hops42% probability
Azure AD sync → cloud token → DC-01
Remediation Impact
Low Effort38% paths
Remove svc-backup GenericAll ACE on Domain Admins
Low Effort29% paths
Enforce MFA on all developer accounts
Medium Effort22% paths
Block WS-01 lateral move to DC subnet
Fix top 3 → eliminate
89%
of inbound attack paths

EXPOSURE DISCOVERY ENGINE FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question