⚠️ Important ⚠️

A list of important considerations when using the Kikimora Agent

Scanning third-party infrastructure is generally frowned upon (or illegal)

If you are planning to use the Kikimora agent on a third-party infrastructure, you should first ask for permission. Unauthorised scanning/monitoring can be considered a crime, based on local law and regulations.

Initiating a scan will require access to the underlying infrastructure

While using the agent you are likely to receive this message when you try to scan a new asset. This is a protection mechanism to protect against unauthorised access. If you just want to test how the agent works you can use the examples in Testing Data [Vulnerable Website].

Deploying an endpoint agent requires direct access to the asset.

Due to the precise details and monitoring features of the Wazuh agents, the only way to test the ednpoint features inside the Kikimora Agent will be to deploy an agent manually on the asset itself.

Context Window & Limitation

We have experimented a lot with the agent, and based on the current implementation, it is expected to run out of memory in longer queries. This doesn't interupt the train of thought, just stops the active reply until you type 'Continue'.

Last updated