Summary is AI-generated, newsdesk-reviewed
  • HackerOne AI advances with Hai, enhancing vulnerability management and code security implementation.
  • Hai's agents expedite risk remediations, saving users up to 40+ hours monthly.
  • New Agentic PtaaS delivers AI-powered exploitability proofs, advancing exposure management capabilities.

HackerOne has unveiled advancements in its security offerings with the transition of its AI platform, Hai, from a mere copilot to an agentic AI system. Additionally, the company has launched its AI-driven code security tool, HackerOne Code, for general use. These innovations aim to enhance continuous exposure management by enabling enterprises to identify, prioritise, and address vulnerabilities more efficiently.

Hai, composed of a team of AI agents, undertakes ongoing analysis and contextualisation of security findings to assist organisations in swiftly prioritising and mitigating risks. Evidence from more than 500,000 validated vulnerabilities informs this process, with 70% of users noting significant time savings, including up to 40+ hours a month.

Speeding Up Risk Mitigation

Current agents within Hai are revolutionising security workflows. The Priority Escalation Agent quickly identifies critical risks, while the Deduplication Agent minimises redundant findings. The Report Assistant Agent ensures cohesive reporting, and the Insight Agent provides historical context for faster validation.

Connor Knabe, Application Security Architect at Veterans United Home Loans, commented, “Hai cut our validation time from 20 minutes to just 5. By replacing manual steps with clear context, we validate faster, clarify impact, and stay aligned.”

Innovations in Code Security

In a step towards its future developments, HackerOne is previewing Agentic Pentest as a Service (PtaaS)

With the general availability of HackerOne Code, the firm addresses the need to detect and resolve vulnerabilities before software deployment. Designed for the AI age, HackerOne Code acts like a developer and thinks like a security researcher, enhancing vulnerability discovery through AI and human oversight.

In a step towards its future developments, HackerOne is previewing Agentic Pentest as a Service (PtaaS). This service continuously assesses exploitability at scale, integrating AI capability while retaining the essential touch of human insight. Such advancements push exposure management into the realm of adversarial validation, offering concrete proofs of exploitability and equipping organisations to prioritise and remediate threats confidently.

Advancements in AI-Driven Security

Nidhi Aggarwal, Chief Product Officer at HackerOne, stated, “Hai has been central to our vision for AI-powered offensive security, and today marks the next stage in its evolution. Powered by insights drawn from over a decade of offensive security expertise, Hai’s new agents and the introduction of Agentic PtaaS extends its capabilities from validation to proof of exploitability, helping organisations continuously reduce exposure and accelerate remediation at scale. In the AI era, secure development must be built in, not bolted on. HackerOne Code empowers developers with validated, trusted code fixes directly within their workflows, enabling them to innovate faster without increasing risk.”

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...