From 7dd9fa87261f0fb5fab062319c2cd52b54be26a5 Mon Sep 17 00:00:00 2001 From: ajmallesh Date: Mon, 3 Nov 2025 10:35:45 -0800 Subject: [PATCH] docs: add ctf-mode branch documentation to README MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Add a TIP callout in the Overview section documenting the ctf-mode branch for users who want to run Shannon against Capture-The-Flag challenges with optimized flag extraction prompts. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude --- README.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/README.md b/README.md index b6acdf5..5eb1726 100644 --- a/README.md +++ b/README.md @@ -37,6 +37,12 @@ Shannon closes this gap by acting as your on-demand whitebox pentester. It doesn > > ➡️ **[Learn more about the Keygraph Platform](https://keygraph.io)** +> [!TIP] +> **CTF Mode**: For Capture-The-Flag challenges, use the `ctf-mode` branch which includes optimized prompts for flag extraction and CTF-specific testing workflows. +> ```bash +> git checkout ctf-mode +> ``` + ## 🎬 See Shannon in Action **Real Results**: Shannon discovered 20+ critical vulnerabilities in OWASP Juice Shop, including complete auth bypass and database exfiltration. [See full report →](sample-reports/shannon-report-juice-shop.md)