Each domain maps to established OWASP testing categories. Findings are returned with severity, evidence, affected endpoint, and remediation context.
Information Gathering & Attack Surface
Maps externally visible assets, endpoints, and exposed interfaces before any active testing begins.
- ◆Admin panels accessible without authentication
- ◆Directory listings and backup file exposure
- ◆Sensitive paths and debug endpoints
- ◆Server software and version disclosure
Public scan
Configuration & Deployment
Identifies server, infrastructure, and deployment misconfigurations that widen the attack surface.
- ◆Insecure CORS policies allowing arbitrary origins
- ◆HTTP methods unnecessarily enabled (PUT, DELETE, TRACE)
- ◆Misconfigured cache-control headers for sensitive content
- ◆Exposed Swagger, OpenAPI, or GraphQL introspection endpoints
Public scan
Authentication Weaknesses
Tests login flows and credential-handling for weaknesses that allow unauthorized account access.
- ◆Username enumeration via response differences
- ◆Missing brute-force and rate-limit protections
- ◆Weak password policy enforcement
- ◆Multi-factor authentication bypass patterns
Both scan types
Authorization & Access Control
Verifies that users can only access resources they are explicitly permitted to view or modify.
- ◆Insecure direct object references (IDOR)
- ◆Horizontal privilege escalation between accounts
- ◆Unprotected admin or privileged functionality
- ◆Missing function-level access controls on API routes
Authenticated scan
Inspects session token handling, cookie security attributes, and CSRF protection coverage.
- ◆Session cookies missing HttpOnly or Secure flags
- ◆SameSite attribute absent or misconfigured
- ◆Session fixation vulnerabilities
- ◆Cross-site request forgery (CSRF) exposures
Both scan types
Runs active injection and manipulation tests across all discovered parameters and form fields.
- ◆SQL injection (error-based, blind, time-based)
- ◆Reflected, stored, and DOM-based cross-site scripting
- ◆Open redirect and URL manipulation
- ◆Path traversal and local file inclusion attempts
Both scan types
Identifies places where the application leaks confidential data through responses, errors, or headers.
- ◆Stack traces and detailed error messages in production
- ◆Personally identifiable information in URL parameters
- ◆API keys, tokens, or credentials in HTTP responses
- ◆Sensitive internal paths and filenames exposed
Both scan types
Security Headers & Browser Protections
Audits HTTP response headers that instruct browsers how to enforce security policies.
- ◆Missing or weak Content-Security-Policy (CSP)
- ◆HTTP Strict Transport Security (HSTS) absent
- ◆Clickjacking risk — X-Frame-Options or CSP frame-ancestors missing
- ◆Referrer-Policy, Permissions-Policy not configured
Public scan
Evaluates the strength and configuration of encrypted transport to prevent interception attacks.
- ◆Deprecated TLS 1.0 / 1.1 protocol support
- ◆Weak or insecure cipher suite configuration
- ◆Mixed HTTP/HTTPS content loading
- ◆HSTS preload and max-age enforcement gaps
Public scan
Tests REST and GraphQL endpoints for authentication bypass, over-exposure, and injection risks.
- ◆Unauthenticated API endpoints returning sensitive data
- ◆Missing rate limiting on API routes
- ◆Verbose API error responses disclosing internals
- ◆GraphQL introspection enabled in production
Both scan types
Analyzes the application's browser-side behavior for injection surface and policy enforcement gaps.
- ◆DOM-based cross-site scripting via dangerous sinks
- ◆Clickjacking susceptibility without frame protection
- ◆Insecure third-party script loading (subresource integrity missing)
- ◆Sensitive data stored in localStorage or sessionStorage
Public scan
Business Logic & Advanced Findings
Identifies flaws in application workflows that automated checks alone cannot always surface.
- ◆Mass assignment and parameter tampering
- ◆Workflow step bypass and sequence manipulation
- ◆Insecure file upload and processing paths
- ◆Account takeover pathways through weak reset flows
Authenticated scan