Sample report·Real findings from a real scan. Scan your repo

Report

Webapp Security Audit

acme/webapp·main·a3f8c91
April 10, 2026·147 files analyzed·4.2s
34/ 100
Critical risk

Executive summary

Critical security vulnerabilities were discovered across the codebase, including hardcoded database credentials, SQL injection vectors, and completely unprotected admin routes. The application is highly susceptible to data exfiltration and unauthorized privilege escalation, with 5 critical findings requiring immediate remediation. Without intervention, an attacker could gain full database access and administrative control within minutes of discovering any single entry point.

What this codebase is doing right

  • HTTPS enforced in production configuration
  • Password hashing uses bcrypt with adequate rounds
  • Database connections use TLS encryption
  • Session tokens have reasonable expiry (24h)

Findings

12 issues, ranked by priority

This is what your report would look like.

Connect your GitHub repo and get the same depth of audit on your own codebase. Read-only access, deleted after the scan, ready in under twenty minutes.