Scan Report

The Scan Report provides a comprehensive analysis of the security posture of your application based on the latest scan results. It highlights vulnerabilities, misconfigurations, and security risks detected across various components, allowing you to assess and prioritize fixes efficiently.

This report is structured into different sections, each focusing on a specific security aspect. It covers web application and API vulnerabilities, offering insights into detected weaknesses and their severity. The report also evaluates SSL configurations, server security, and mail server settings to identify potential risks in encryption and communication channels. Additionally, it examines the technology stack, detecting outdated JavaScript packages and server-side frameworks that might introduce security gaps.

Beyond application security, the Scan Report highlights information exposure risks, including leaked sensitive data, API keys, and cloud misconfigurations. Each finding is categorized based on severity, enabling you to focus on critical threats first. You also have the flexibility to review reported findings, mark them as critical, or ignore those that are not relevant to your environment.

By analyzing the Scan Report, security teams and developers can gain a clear understanding of their security risks and take proactive measures to strengthen their defenses.

Jump Right In

Displays real-time scan progress, including authenticated and unauthenticated crawling, along with OWASP Top

Provides a high-level overview of the security posture of the entire scanned application

Lists detected security issues in web applications, categorized by severity, with detailed remediation steps.

Identifies all the security flaws found in a particular API endpoint, showing affected requests and

Highlights sensitive data leaks like PII, secret data leaks like credentials, and cloud misconfigurations.

Analyzes SSL/TLS configurations, checking for vulnerabilities, expiration status, and compliance issues.

Detects outdated JavaScript libraries and server-side technologies with known security risks.

Scans open ports on the server, assessing potential risks and providing mitigation strategies

Evaluates the mail server for misconfigurations like open relays and reverse DNS mismatches.

Last updated