Skip to main content

Getting Started

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

This page walks through the steps to start using Takumi byGMO and how to pick up each capability. Reading this single page is enough to see how Takumi adoption flows end-to-end.

1. Sign up for Shisho Cloud

Takumi features are scoped to organizations in Shisho Cloud. Start by registering a user and creating an organization from the sign-up page.

For background on what an organization is and how roles and membership work, see Organizations.

2. Subscribe to the Base Subscription

Once you have signed up, attach a base subscription to your organization. The base subscription is a monthly fixed fee and is the prerequisite for using the Takumi feature set inside an organization. It also includes the monthly credit allowance and the free quotas for Guard and Runner.

Takumi plan purchase complete screen

For the full purchase flow, included quotas, and pricing structure, see Subscribing to a Plan.

3. Try the Takumi Features

Once sign-up and subscription are in place, pick the feature that matches what you want to try first. Each capability has its own quickstart.

Assessment (whitebox / blackbox)

Hand Takumi a repository or a target URL, and it autonomously reviews the application feature-by-feature, perspective-by-perspective. You can get the kind of coverage a manual security engineer would produce, but in a fraction of the time — and you can chain the findings into Autofix to generate the fix Pull Request automatically.

Whitebox assessment start dialog

Pentesting Quickstart

Takumi Guard

Takumi Guard is a package-registry proxy that blocks malicious package installs at install time for npm / PyPI / RubyGems. A single registry-URL change protects developer machines and CI environments, and you also get searchable install history for tracing a package whose maliciousness is discovered later.

Takumi Guard Quickstart

Takumi Runner

Takumi Runner is a GitHub Actions runner that traces job execution with eBPF. Switch the runs-on of a workflow and Takumi starts recording every process, network call, and file operation — useful for catching supply-chain anomalies at build time and for incident response.

Runner setup wizard

Takumi Runner Quickstart

Other Capabilities

Assessment includes a number of related features. Pick up whichever feels useful next: