Skip to main content

Repeater Agent


This feature is in Private Beta for Enterprise Customers. Contact us via email or your Private Slack Support Channel for more information.


Escape's Repeater Agent allows you to scan scan Internal Apps behind your organization's firewall or VPN.

This repeater creates a private tunnel between Escape and one of your servers. All the escape requests will comes from this server.

Here is a schema of the infrastructure :

Escape repeater

First, the repeater client you have deployed locally will connect to the repeater manager (1). When you start a scan on escape, instead of sending the requests directly to your server, Escape will send them to the repeater manager (2). Your client will receive the requests and send them to your server (3 & 4). The results are sent back to Escape to allow you to see scans results.

How to setup a repeater

First, you need to connect to Escape and go to the repeater page. Here you can see the list of your active repeaters and add a new one.

After creating a new repeater, you will be able to retrieve it's repeater id.

You will now need to setup a repeater client on your server. For that, follow the readme of the repeater client.

Once the client is setup, you can configure any of your applications like this :

"params": {
"client": {
"proxy": {
"type": "repeater",
"target": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" // Put here your repeater id

// ...


For more information about how to whitelist Escape scans, read the Scan Internal APIs page.