diff --git a/README.md b/README.md index 424cab5..b6acdf5 100644 --- a/README.md +++ b/README.md @@ -99,6 +99,16 @@ Shannon is available in two editions: You need either a **Claude Code OAuth token** or an **Anthropic API key** to run Shannon. Get your token from the [Anthropic Console](https://console.anthropic.com) and pass it to Docker via the `-e` flag. +### Environment Configuration (Optional) + +To prevent Claude Code from hitting token limits during long report generation, set the max output tokens before running Shannon: + +```bash +export CLAUDE_CODE_MAX_OUTPUT_TOKENS=64000 +``` + +This is especially useful for extensive penetration testing reports or when analyzing large codebases. + ### Quick Start with Docker #### Build the Container diff --git a/src/utils/output-formatter.js b/src/utils/output-formatter.js index 82bf46b..5c2aaaf 100644 --- a/src/utils/output-formatter.js +++ b/src/utils/output-formatter.js @@ -45,12 +45,12 @@ function summarizeTodoUpdate(input) { export function getAgentPrefix(description) { // Map agent names to their prefixes const agentPrefixes = { - 'injection-vuln': '[SQLi/Cmd]', + 'injection-vuln': '[Injection]', 'xss-vuln': '[XSS]', 'auth-vuln': '[Auth]', 'authz-vuln': '[Authz]', 'ssrf-vuln': '[SSRF]', - 'injection-exploit': '[SQLi/Cmd]', + 'injection-exploit': '[Injection]', 'xss-exploit': '[XSS]', 'auth-exploit': '[Auth]', 'authz-exploit': '[Authz]', @@ -65,7 +65,7 @@ export function getAgentPrefix(description) { } // Fallback to partial matches for backwards compatibility - if (description.includes('injection')) return '[SQLi/Cmd]'; + if (description.includes('injection')) return '[Injection]'; if (description.includes('xss')) return '[XSS]'; if (description.includes('authz')) return '[Authz]'; // Check authz before auth if (description.includes('auth')) return '[Auth]';