Architecture
Skill-based design, deployment options, and how investigations run.
Skill-based design
Diverg is built around discrete, composable skills. Each skill is a well-defined capability, reconnaissance, web vulnerabilities, headers/SSL, auth testing, API testing, blockchain analysis, OSINT, that can be combined dynamically based on the target type. Investigating a DeFi protocol triggers a different skill mix than assessing a traditional web app. See Skills System for the full list.
Methodologies
We align with industry standards so that findings are defensible and repeatable:
- OWASP Testing Guide, for web application security
- PTES (Penetration Testing Execution Standard), for structured pentests
- MITRE ATT&CK, for threat modeling and attack simulation
Data sources
Diverg integrates with major providers for richer results. When API keys are configured, we pull live data from:
- Blockchain: Solscan Pro, Arkham, Etherscan, Bubblemaps
- Web/OSINT: Wappalyzer, Shodan, Censys, Wayback Machine, Common Crawl
- Enterprise: Custom threat-intel feeds and commercial providers (on request)
When a source is unavailable, we do not substitute fake data; we mark those checks as skipped in the report. See Fact-Only Reporting.
Deployment models
- Cloud SaaS (Diverg Open): Hosted dashboard and API at dash.divergsec.com.
- Open-source CLI: The diverg-auto scanner runs locally or in CI (see Installation).
- Diverg Auto (OpenClaw): Natural-language agent commands that drive scans and investigations through Diverg Open.
- Browser extension: diverg-extension for in-browser Diverg Open workflows.
- Enterprise on-premise: Self-hosted and private engagements, [email protected].