New to Cleft? Start with our guides on making voice notes and organizing notes to get the most out of your security workflow. Also check out how Systems Builders use Cleft for process optimization.

Common Challenges

Important: While Cleft is perfect for processing security findings and documenting assessments, it’s not designed for recording entire penetration test sessions (30-minute limit). Use your regular testing tools, then process the findings in Cleft for better organization and reporting.

Power up your workflow: Check out our Workflow Recipes and Apple Shortcuts integration for security automation possibilities.

A Day Using Cleft

1

Morning Setup (8:00 - 9:00)
2

Meeting Review

Process client meeting transcripts into structured requirements.

3

Environment Setup

Document configuration details and testing parameters.

4

Methodology Review

Organize approach and planned test cases.

Security Testing (9:00 - 4:00)

Assessment Work

  • Capture quick findings
  • Document brief observations
  • Record key steps
  • Track progress

Evidence Collection

  • Organize artifacts
  • Document context
  • Build proof chains

Documentation (4:00 - 6:00)

Report Building

  • Process findings
  • Create summaries
  • Draft recommendations

Review Process

  • Validate findings
  • Check evidence
  • Plan follow-ups

Ready to enhance your security work?

Join other security professionals who streamline their assessments with voice-first documentation.

Download Cleft

Book your onboarding call

Meet the founders for a free personalized onboarding experience ✨