diff --git a/README.md b/README.md
index c1f7ec92..7fdbeb7f 100644
--- a/README.md
+++ b/README.md
@@ -1,732 +1,101 @@
->[!NOTE]
-> **[📢 New: Claude models on AWS Bedrock and Google Vertex AI now supported. →](https://github.com/KeygraphHQ/shannon/discussions/categories/announcements)**
+> [!NOTE]
+> **📢 New:** Claude models on AWS Bedrock and Google Vertex AI are now supported.
+> → https://github.com/KeygraphHQ/shannon/discussions/categories/announcements

-# Shannon — AI Pentester by Keygraph
-
-

+# Shannon — Autonomous AI Pentester
-Shannon is an autonomous, white-box AI pentester for web applications and APIs.
-It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities before they reach production.
+
+
+
----
+**Shannon is an autonomous AI-powered penetration testing tool for web applications and APIs.**
-[Keygraph Website](https://keygraph.io) • [Announcements](https://github.com/KeygraphHQ/shannon/discussions/categories/announcements) • [Discord](https://discord.gg/KAqzSHHpRt)
+It analyzes your application's source code, identifies attack vectors, and executes real exploits to validate vulnerabilities before they reach production.
---
-
-
-## 🎯 What is Shannon?
-
-Shannon is an AI pentester developed by [Keygraph](https://keygraph.io). It performs white-box security testing of web applications and their underlying APIs by combining source code analysis with live exploitation.
-
-Shannon analyzes your web application's source code to identify potential attack vectors, then uses browser automation and command-line tools to execute real exploits (injection attacks, authentication bypass, SSRF, XSS) against the running application and its APIs. Only vulnerabilities with a working proof-of-concept are included in the final report.
-
-**Why Shannon Exists**
-
-Thanks to tools like Claude Code and Cursor, your team ships code non-stop. But your penetration test? That happens once a year. This creates a *massive* security gap. For the other 364 days, you could be unknowingly shipping vulnerabilities to production.
-
-Shannon closes that gap by providing on-demand, automated penetration testing that can run against every build or release.
-
-> [!NOTE]
-> **Shannon is part of the Keygraph Security and Compliance Platform**
->
-> Keygraph is an integrated security and compliance platform covering IAM, MDM, compliance automation (SOC 2, HIPAA), and application security. Shannon handles the AppSec layer. The broader platform automates evidence collection, audit readiness, and continuous compliance across multiple frameworks.
->
-> **[Learn more at keygraph.io](https://keygraph.io)**
-
-## 🎬 Shannon in Action
-
-Shannon identified 20+ vulnerabilities in OWASP Juice Shop, including authentication bypass and database exfiltration. [Full report →](sample-reports/shannon-report-juice-shop.md)
-
-
-
-## ✨ Features
-
-- **Fully Autonomous Operation**: A single command launches the full pentest. Shannon handles 2FA/TOTP logins (including SSO), browser navigation, exploitation, and report generation without manual intervention.
-- **Reproducible Proof-of-Concept Exploits**: The final report contains only proven, exploitable findings with copy-and-paste PoCs. Vulnerabilities that cannot be exploited are not reported.
-- **OWASP Vulnerability Coverage**: Identifies and validates Injection, XSS, SSRF, and Broken Authentication/Authorization, with additional categories in development.
-- **Code-Aware Dynamic Testing**: Analyzes source code to guide attack strategy, then validates findings with live browser and CLI-based exploits against the running application.
-- **Integrated Security Tooling**: Leverages Nmap, Subfinder, WhatWeb, and Schemathesis during reconnaissance and discovery phases.
-- **Parallel Processing**: Vulnerability analysis and exploitation phases run concurrently across all attack categories.
-
-## 📦 Product Line
-
-Shannon is developed by [Keygraph](https://keygraph.io) and available in two editions:
-
-| Edition | License | Best For |
-|---------|---------|----------|
-| **Shannon Lite** | AGPL-3.0 | Local testing of your own applications. |
-| **Shannon Pro** | Commercial | Organizations needing a single AppSec platform (SAST, SCA, secrets, business logic testing, autonomous pentesting) with CI/CD integration and self-hosted deployment. |
-
-> **This repository contains Shannon Lite,** the core autonomous AI pentesting framework. **Shannon Pro** is Keygraph's all-in-one AppSec platform, combining SAST, SCA, secrets scanning, business logic security testing, and autonomous AI pentesting in a single correlated workflow. Every finding is validated with a working proof-of-concept exploit.
-
-> [!IMPORTANT]
-> **White-box only.** Shannon Lite is designed for **white-box (source-available)** application security testing.
-> It expects access to your application's source code and repository layout.
-
-### Shannon Pro: Architecture Overview
-
-Shannon Pro is an all-in-one application security platform that replaces the need to stitch together separate SAST, SCA, secrets scanning, and pentesting tools. It operates as a two-stage pipeline: agentic static analysis of the codebase, followed by autonomous AI penetration testing. Findings from both stages are cross-referenced and correlated, so every reported vulnerability has a working proof-of-concept exploit and a precise source code location.
-
-**Stage 1: Agentic Static Analysis**
-
-Shannon Pro transforms the codebase into a Code Property Graph (CPG) combining the AST, control flow graph, and program dependence graph. It then runs five analysis capabilities:
-
-- **Data Flow Analysis (SAST)**: Identifies sources (user input, API requests) and sinks (SQL queries, command execution), then traces paths between them. At each node, an LLM evaluates whether the specific sanitization applied is sufficient for the specific vulnerability in context, rather than relying on a hard-coded allowlist of safe functions.
-- **Point Issue Detection (SAST)**: LLM-based detection of single-location vulnerabilities: weak cryptography, hardcoded credentials, insecure configuration, missing security headers, weak RNG, disabled certificate validation, and overly permissive CORS.
-- **Business Logic Security Testing (SAST)**: LLM agents analyze the codebase to discover application-specific invariants (e.g., "document access must verify organizational ownership"), generate targeted fuzzers to violate those invariants, and synthesize full PoC exploits. This catches authorization failures and domain-specific logic errors that pattern-based scanners cannot detect.
-- **SCA with Reachability Analysis**: Goes beyond flagging CVEs by tracing whether the vulnerable function is actually reachable from application entry points via the CPG. Unreachable vulnerabilities are deprioritized.
-- **Secrets Detection**: Combines regex pattern matching with LLM-based detection (for dynamically constructed credentials, custom formats, obfuscated tokens) and performs liveness validation against the corresponding service using read-only API calls.
-
-**Stage 2: Autonomous Dynamic Penetration Testing**
-
-The same multi-agent pentest pipeline as Shannon Lite (reconnaissance, parallel vulnerability analysis, parallel exploitation, reporting), enhanced with static findings injected into the exploitation queue. Static findings are mapped to Shannon's five attack domains (Injection, XSS, SSRF, Auth, Authz), and exploit agents attempt real proof-of-concept attacks against the running application for each finding.
-
-**Static-Dynamic Correlation**
-
-This is the core differentiator. A data flow vulnerability identified in static analysis (e.g., unsanitized input reaching a SQL query) is not reported as a theoretical risk. It is fed to the corresponding exploit agent, which attempts to exploit it against the live application. Confirmed exploits are traced back to the exact source code location, giving developers both proof of exploitability and the line of code to fix.
-
-**Deployment Model**
-
-Shannon Pro supports a self-hosted runner model (similar to GitHub Actions self-hosted runners). The data plane, which handles code access and all LLM API calls, runs entirely within the customer's infrastructure using the customer's own API keys. Source code never leaves the customer's network. The Keygraph control plane handles job orchestration, scan scheduling, and the reporting UI, receiving only aggregate findings.
-| Capability | Shannon Lite | Shannon Pro (All-in-One AppSec) |
-| --- | --- | --- |
-| **Licensing** | AGPL-3.0 | Commercial |
-| **Static Analysis** | Code review prompting | Full agentic SAST, SCA, secrets, business logic testing |
-| **Dynamic Testing** | Autonomous AI pentesting | Autonomous AI pentesting with static-dynamic correlation |
-| **Analysis Engine** | Code review prompting | CPG-based data flow with LLM reasoning at every node |
-| **Business Logic** | None | Automated invariant discovery, fuzzer generation, exploit synthesis |
-| **CI/CD Integration** | Manual / CLI | Native CI/CD, GitHub PR scanning |
-| **Deployment** | CLI | Managed cloud or self-hosted runner |
-| **Boundary Analysis** | None | Automatic service boundary detection with team routing |
+🌐 Website: https://keygraph.io
+📢 Announcements: https://github.com/KeygraphHQ/shannon/discussions/categories/announcements
+💬 Community: https://discord.gg/KAqzSHHpRt
-[Full technical details →](./SHANNON-PRO.md)
-
-## 📑 Table of Contents
-
-- [What is Shannon?](#-what-is-shannon)
-- [Shannon in Action](#-shannon-in-action)
-- [Features](#-features)
-- [Product Line](#-product-line)
-- [Setup & Usage Instructions](#-setup--usage-instructions)
- - [Prerequisites](#prerequisites)
- - [Quick Start](#quick-start)
- - [Monitoring Progress](#monitoring-progress)
- - [Stopping Shannon](#stopping-shannon)
- - [Usage Examples](#usage-examples)
- - [Workspaces and Resuming](#workspaces-and-resuming)
- - [Configuration (Optional)](#configuration-optional)
- - [AWS Bedrock](#aws-bedrock)
- - [Google Vertex AI](#google-vertex-ai)
- - [[EXPERIMENTAL - UNSUPPORTED] Router Mode (Alternative Providers)](#experimental---unsupported-router-mode-alternative-providers)
- - [Output and Results](#output-and-results)
-- [Sample Reports](#-sample-reports)
-- [Benchmark](#-benchmark)
-- [Architecture](#️-architecture)
-- [Coverage and Roadmap](#-coverage-and-roadmap)
-- [Disclaimers](#️-disclaimers)
-- [License](#-license)
-- [Community & Support](#-community--support)
-- [Get in Touch](#-get-in-touch)
+
---
-## 🚀 Setup & Usage Instructions
-
-### Prerequisites
-
-- **Docker** - Container runtime ([Install Docker](https://docs.docker.com/get-docker/))
-- **AI Provider Credentials** (choose one):
- - **Anthropic API key** (recommended) - Get from [Anthropic Console](https://console.anthropic.com)
- - **Claude Code OAuth token**
- - **AWS Bedrock** - Route through Amazon Bedrock with AWS credentials (see [AWS Bedrock](#aws-bedrock))
- - **Google Vertex AI** - Route through Google Cloud Vertex AI (see [Google Vertex AI](#google-vertex-ai))
- - **[EXPERIMENTAL - UNSUPPORTED] Alternative providers via Router Mode** - OpenAI or Google Gemini via OpenRouter (see [Router Mode](#experimental---unsupported-router-mode-alternative-providers))
-
-### Quick Start
-
-```bash
-# 1. Clone Shannon
-git clone https://github.com/KeygraphHQ/shannon.git
-cd shannon
-
-# 2. Configure credentials (choose one method)
-
-# Option A: Export environment variables
-export ANTHROPIC_API_KEY="your-api-key" # or CLAUDE_CODE_OAUTH_TOKEN
-export CLAUDE_CODE_MAX_OUTPUT_TOKENS=64000 # recommended
-
-# Option B: Create a .env file
-cat > .env << 'EOF'
-ANTHROPIC_API_KEY=your-api-key
-CLAUDE_CODE_MAX_OUTPUT_TOKENS=64000
-EOF
-
-# 3. Run a pentest
-./shannon start URL=https://your-app.com REPO=your-repo
-```
-
-Shannon will build the containers, start the workflow, and return a workflow ID. The pentest runs in the background.
-
-### Monitoring Progress
-
-```bash
-# View real-time worker logs
-./shannon logs
-
-# Query a specific workflow's progress
-./shannon query ID=shannon-1234567890
-
-# Open the Temporal Web UI for detailed monitoring
-open http://localhost:8233
-```
-
-### Stopping Shannon
-
-```bash
-# Stop all containers (preserves workflow data)
-./shannon stop
-
-# Full cleanup (removes all data)
-./shannon stop CLEAN=true
-```
-
-### Usage Examples
-
-```bash
-# Basic pentest
-./shannon start URL=https://example.com REPO=repo-name
-
-# With a configuration file
-./shannon start URL=https://example.com REPO=repo-name CONFIG=./configs/my-config.yaml
-
-# Custom output directory
-./shannon start URL=https://example.com REPO=repo-name OUTPUT=./my-reports
-
-# Named workspace
-./shannon start URL=https://example.com REPO=repo-name WORKSPACE=q1-audit
-
-# List all workspaces
-./shannon workspaces
-```
-
-### Workspaces and Resuming
-
-Shannon supports **workspaces** that allow you to resume interrupted or failed runs without re-running completed agents.
-
-**How it works:**
-- Every run creates a workspace in `audit-logs/` (auto-named by default, e.g. `example-com_shannon-1771007534808`)
-- Use `WORKSPACE=