Skip to main content

Best Practices

Guidelines and best practices for using FullHunt Agentic AI effectively and securely.

Query Design

Be Specific and Clear

Good Examples:

✅ "Find all subdomains of example.com with exposed admin panels"
✅ "Search for CVE-2024-1234 and check EPSS score"
✅ "Get SSL certificates expiring in the next 30 days"

Poor Examples:

❌ "Check this domain" (too vague)
❌ "Security stuff" (no actionable request)
❌ "Everything about example.com" (too broad)

Use Multi-Step Workflows

Instead of multiple separate queries, combine them into a single workflow:

Inefficient:

Query 1: "Find subdomains of example.com"
Query 2: "Check technologies for those subdomains"
Query 3: "Search for vulnerabilities"

Efficient:

"Investigate example.com:
1. Discover all subdomains
2. Identify technology stack for each
3. Search for known vulnerabilities
4. Prioritize by severity"

Provide Context

Help the AI understand your goals:

"I'm investigating a potential security incident. For IP 1.2.3.4:
- Check if it's a known threat
- Find associated domains
- Review passive DNS history
- Check for connections to our infrastructure"

Performance Optimization

Batch Operations

When analyzing multiple targets, use batch queries:

Inefficient:

"Check example.com"
"Check test.com"
"Check demo.com"

Efficient:

"Analyze these domains and compare security postures:
- example.com
- test.com
- demo.com"

Use Appropriate Tools

Select the right tool for your needs:

  • Quick lookups: Use fullhunt_host or fullhunt_domain_details
  • Comprehensive scans: Use fullhunt_scan
  • Historical data: Use intel_* tools
  • Threat intel: Use nexus_* tools

Security Best Practices

API Key Management

Never Expose Keys

Don't:

  • Commit keys to version control
  • Share keys in chat/email
  • Hardcode keys in scripts
  • Use production keys in development

Do:

  • Use environment variables
  • Rotate keys regularly
  • Use different keys per environment
  • Revoke unused keys immediately

Environment Variables

# .env file (never commit this)
FULLHUNT_API_KEY=your-api-key-here

# Load in your MCP config
"headers": {
"X-API-KEY": "${env:FULLHUNT_API_KEY}"
}

Access Control

Principle of Least Privilege

Grant only necessary permissions:

Development: Read-only API key
Testing: Limited-scope API key
Production: Full-access API key (restricted)

Monitor Usage

Regularly review API usage:

  • Check request logs
  • Monitor for unusual patterns
  • Set up usage alerts
  • Review active API keys

Data Handling

Sensitive Information

Be careful with sensitive data in queries:

Don't:

"Search for compromised password 'MyPassword123'"

Do:

"Search for compromised credentials for user@example.com"

Log Management

Ensure logs don't contain:

  • API keys
  • Passwords or credentials
  • Sensitive personal information
  • Internal system details

Workflow Optimization

Common Use Cases

Daily Security Monitoring

"Daily security check for example.com:
1. Check for new subdomains
2. Scan for new vulnerabilities
3. Review SSL certificate status
4. Check for dark web mentions
5. Summarize critical findings"

Incident Response

"Investigate suspicious activity from IP 1.2.3.4:
1. Check IP reputation and threat score
2. Identify geolocation and ASN
3. Find all associated domains
4. Review passive DNS history
5. Check for Tor/VPN usage
6. Generate incident report"

Vulnerability Management

"Vulnerability triage for CVE-2024-1234:
1. Get CVE details and CVSS score
2. Check EPSS probability
3. Verify CISA KEV status
4. Find available exploits
5. Check if our assets are affected
6. Provide remediation recommendations"

Third-Party Risk Assessment

"Assess vendor security for vendor.example.com:
1. Map attack surface
2. Identify technologies and versions
3. Search for known vulnerabilities
4. Check for data breaches
5. Review SSL/TLS configuration
6. Generate risk score"

Error Handling

Common Issues and Solutions

Authentication Failed

Error: "Authentication failed"

Solutions:

  • Verify API key is correct
  • Check for extra spaces
  • Ensure key is active
  • Regenerate if compromised

Tool Not Available

Error: "Tool not found" or "Access denied"

Solutions:

  • Verify account tier supports tool
  • Check tool name spelling
  • Review Tools Reference
  • Contact support for access

Timeout Errors

Error: "Request timeout"

Solutions:

  • Break large queries into smaller parts
  • Use more specific searches
  • Check network connectivity
  • Retry with exponential backoff

Integration Best Practices

Claude Desktop

Configuration

Keep your config organized:

{
"mcpServers": {
"fullhunt-production": {
"transport": "http",
"url": "https://fullhunt.io/api/v1/mcp",
"headers": {
"X-API-KEY": "${env:FULLHUNT_API_KEY_PROD}"
}
},
"fullhunt-staging": {
"transport": "http",
"url": "https://fullhunt.io/api/v1/mcp",
"headers": {
"X-API-KEY": "${env:FULLHUNT_API_KEY_STAGING}"
}
}
}
}

Session Management

  • Start fresh sessions for unrelated investigations
  • Clear context when switching between tasks
  • Save important findings before closing

Cursor IDE

Project-Specific Configuration

Use workspace-specific API keys:

{
"mcpServers": {
"fullhunt": {
"transport": "http",
"url": "https://fullhunt.io/api/v1/mcp",
"headers": {
"X-API-KEY": "${env:FULLHUNT_PROJECT_API_KEY}"
}
}
}
}

Reporting & Documentation

Executive Summaries

Request clear, actionable reports:

"Generate executive summary of example.com security assessment:
- Number of assets discovered
- Critical findings count
- Top 3 risks with impact
- Recommended immediate actions
- 30-day security roadmap"

Technical Reports

For detailed technical documentation:

"Create detailed technical report for example.com:
- Complete asset inventory with tech stack
- Vulnerability matrix with CVSS scores
- Exploitation likelihood (EPSS)
- Detailed remediation steps
- Verification procedures"

Trend Analysis

Track changes over time:

"Compare example.com security posture with last month:
- New assets discovered
- Vulnerabilities introduced/fixed
- Security score changes
- Exposure changes"

Cost Optimization

Efficient Querying

Minimize unnecessary API calls:

Inefficient:

Multiple separate tool calls for related information

Efficient:

Single comprehensive query that leverages AI chaining

Caching

Leverage AI's context for repeated queries:

"Get subdomains for example.com"
[Results cached in conversation]

"Now check each of those subdomains for vulnerabilities"
[Uses cached results, no new API call for subdomains]

Scheduled Operations

Use enterprise scheduled scans instead of manual repeated scans:

  • Set up automated daily/weekly scans
  • Configure alerts for changes
  • Review consolidated reports

Compliance & Governance

Authorized Testing Only

⚠️ Important: Only scan and investigate:

  • Your own assets
  • Assets you have written permission to test
  • Public information for research purposes

Data Retention

Understand data retention policies:

  • Query results are session-specific
  • Enterprise accounts have data retention settings
  • Configure retention based on compliance needs

Audit Trails

Maintain audit logs:

  • Document investigation purposes
  • Track queries and findings
  • Record remediation actions
  • Maintain compliance evidence

Advanced Tips

Custom Workflows

Create reusable workflow templates:

"Security Audit Template:
For domain {DOMAIN}:
1. Asset Discovery
2. Technology Identification
3. Vulnerability Assessment
4. Dark Web Monitoring
5. Risk Scoring
6. Remediation Plan"

Integration with SOAR

Combine with Security Orchestration:

# Pseudo-code
incident_ip = get_alert_ip()
query = f"Investigate IP {incident_ip} and generate threat profile"
result = fullhunt_mcp.query(query)
soar.create_ticket(result)

Continuous Monitoring

Set up continuous monitoring workflows:

"Monitor example.com continuously:
- Alert on new subdomains
- Alert on new vulnerabilities (CVSS > 7)
- Alert on SSL expiry (< 30 days)
- Alert on dark web mentions
- Daily summary report"

Getting Help

Documentation

Support Channels

  • Email: team@fullhunt.io
  • Documentation: api-docs.fullhunt.io
  • Professional Support: Available with Professional plan
  • Dedicated Support: Available with Enterprise plan

Community

  • Share workflows and tips
  • Contribute to documentation
  • Report issues and bugs
  • Request new features

Ready to optimize your security workflows? Start implementing these best practices today!