Skip to main content
Exclusive access to Attack Surface Management solution is provided solely for Enterprise users. If you are interested in learning more about the Enterprise Edition, please contact us.
Trickest’s Attack Surface Management (ASM) solution enables security teams to continuously discover, enrich, and monitor their entire digital footprint through adaptive, modular workflows. It replaces rigid traditional ASM platforms with a flexible architecture that scales with your infrastructure and integrates seamlessly into existing security operations.

Solution Tabs

The ASM solution experience is organized into three tabs that guide you from design to execution to outcomes:

Builder Tab

Design and customize the ASM workflow. This view shows the prebuilt ASM workflow graph and lets you tailor modules (for example, Seeding, Discovery, Enrichment) and parameters to your environment, add open‑source or in‑house tools, and define inputs and outputs. The Builder is where you configure the exact workflow used for ASM.

Modules used in the ASM Workflow

Note: The workflow also uses internal utility steps (such as deduplication) to normalize and merge intermediate results between stages.

Configure and Execute ASM

File Inputs

  • Domains (domains.txt): Root domains to seed discovery (for example, example.com, corp.example.com).
  • IP ranges (ip-ranges.txt): Include targets beyond DNS (for example, 203.0.113.0/24).
Input formats
# domains.txt
example.com
corp.example.com

# ip-ranges.txt
203.0.113.0/24
198.51.100.10

Provide Inputs via Script

Steps
  1. Add a script node and output your list (one per line) to out/output.txt.
  2. Connect its output to discovery modules (domains) and to resolution/enrichment stages (IP ranges).
Examples Domain’s script
cat << "EOF" | tee out/output.txt
example.com
corp.example.com
EOF
IP Ranges Script
cat << "EOF" | tee out/output.txt
203.0.113.0/24
198.51.100.10
EOF

Provide Inputs via Modules or Integrations

Use the Get Data from Dataset module to pull your domains and IP ranges from an existing dataset and feed them straight into the ASM workflow. Think of it as “selecting” the right column from your source of truth and sending it forward — no manual files needed.
If you already maintain a solution dataset with assets, this is the easiest way to keep ASM in sync. When the dataset updates, your next run picks up the changes automatically.
Steps
  • Drag the Get Data from Dataset module into the canvas.
  • Point it to your asset dataset (for example, “Assets Imported”).
  • Use one instance to output domains, and another to output IP ranges.
  • Connect each module’s data output to the matching ASM inputs
What you’ll get
  • Domains: one domain per line (for example, example.com).
  • IP ranges: one entry per line (for example, 203.0.113.0/24 or 198.51.100.10).
Integrations: With custom modules, this step can connect to any system you use — CMDBs, asset inventories, data warehouses (S3, BigQuery), spreadsheets, ticketing, or threat intel — as long as the module outputs a simple newline‑delimited list.

Run Tab

A specific execution of the workflow in time. You can start on‑demand or scheduled runs, monitor node‑level progress and logs, and review artifacts produced by each node. On the left sidebar you can see each node output and the status of the node. On the right sidebar you can see run list and when solution was executed.
For more information about workflow execution, check Monitoring Runs.

Insights

Explore the results generated by the workflow. View consolidated assets, changes over time (new, removed, resurfaced), technology fingerprints, open ports and services, and web exposure. Insights provides deltas, trends, and context to help prioritize follow‑up actions and integrate with downstream systems.
For more information about insights, check Insights.
Looking to adapt this Solution to your environment? See Custom Solutions for patterns and best practices.

Solution API

You can access Solutions API programmatically to list solutions, browse datasets, and fetch results. Most users don’t need to memorize endpoints—when you open any Solution in Trickest, you’ll find an “API Docs” panel with ready‑to‑use snippets (curl, Python, JavaScript) tailored to your workspace and the selected dataset.
Where to find it: Open a Solution → Click on API Docs button. It shows the correct base URL, your vault‑scoped endpoints, and example requests you can copy and run.
I