Manage Scans
Scan Report
The Scan Report provides a comprehensive analysis of the security posture of your application based on the latest scan results. It highlights vulnerabilities, misconfigurations, and security risks detected across various components, allowing you to assess and prioritize fixes efficiently.
This report is structured into different sections, each focusing on a specific security aspect. It covers web application and API vulnerabilities, offering insights into detected weaknesses and their severity. The report also evaluates SSL configurations, server security, and mail server settings to identify potential risks in encryption and communication channels. Additionally, it examines the technology stack, detecting outdated JavaScript packages and server-side frameworks that might introduce security gaps.
Beyond application security, the Scan Report highlights information exposure risks, including leaked sensitive data, API keys, and cloud misconfigurations. Each finding is categorized based on severity, enabling you to focus on critical threats first. You also have the flexibility to review reported findings, mark them as critical, or ignore those that are not relevant to your environment.
By analyzing the Scan Report, security teams and developers can gain a clear understanding of their security risks and take proactive measures to strengthen their defenses.
Scanner
Displays real-time scan progress, including authenticated and unauthenticated crawling, along with OWASP TopScan Summary
Provides a high-level overview of the security posture of the entire scanned applicationWeb App Vulnerabilities
Lists detected security issues in web applications, categorized by severity, with detailed remediation stepsDetected API's vulnerabilities
Identifies all the security flaws found in a particular API endpoint, showing affected requestsInformation Exposure
Highlights sensitive data leaks like PII, secret data leaks like credentials, and cloud misconfigurations.SSL Certificate
Analyzes SSL/TLS configurations, checking for vulnerabilities, expiration status, and compliance issues.Vulnerable Version detection
Detects outdated JavaScript libraries and server-side technologies with known security risks.Server Ports Scan
Scans open ports on the server, assessing potential risks and providing mitigation strategies.Mail Configuration
Evaluates the mail server for misconfigurations like open relays and reverse DNS mismatches