Reading results
The Scan detail page is where most time is spent. It renders everything a single scan produced, organised so the highest-signal information is at the top.
Top-of-page summary
- Target + status β URL, scan types, current phase, duration.
- Finding counts by severity β five pills (CRITICAL β INFO) with counts. Click one to filter the list below.
- Attack chain map β if Pro+ AI is on, this is the first thing to read.
- Action buttons β Rerun, Export report, Share link, Delete.
Attack chain mindmap
The mindmap is the single most important view on this page. It shows multi-step compromise paths β sequences of findings that, combined, escalate to a critical outcome.
Example: exposed .env file (LOW by itself) β DB creds leaked β database RCE via misconfigured extension = CRITICAL.
Read chains left-to-right. Node colour = severity. Click any node to jump to the underlying finding.
Chain synthesis is driven by rules + LLM validation. See Attack chain synthesis for details.
Findings list
Sorted by severity (CRITICAL first), with a per-row toolbar:
- Verified badge β the finding was re-run through an independent verifier and still triggered. Filter for
verified:trueif you only want high-confidence items. - Proof block β HTTP request + response that demonstrates the issue. Sensitive bodies are encrypted at rest (per-tenant Fernet key).
- CVSS score + vector β CVSS 3.1, calculated per-finding based on exploitability + impact context.
- Validation steps β numbered reproduction checklist.
- Exploit-DB matches β up to 5 ranked Exploit-DB candidates (CVE-exact, CPE+version, product keyword).
- AI narrative (Pro+) β plain-English description of the impact.
- AI remediation β actionable fix.
- OWASP category + CWE β maps to OWASP Top 10 and CWE Top 25.
Finding validation
Every finding goes through the Accuracy Gate before persisting:
- Raw detection by the tool (e.g., SQLi payload reflected).
- Second-pass verifier runs an orthogonal probe (e.g., time-based boolean that can't hit on reflection alone).
- Junk filter β anything that looks like a CSS filename, HTML fragment, or null response body is dropped.
- Only survivors are written to the DB.
If a finding made it to the list, it survived that gate. The Verified badge additionally means a third-party tool (sqlmap, nuclei, metasploit-style check) confirmed it independently.
Exploit-DB matches
Each finding gets ranked Exploit-DB candidates. Column meanings:
- confidence β 0.0β1.0, rolling up match type + CVE overlap + age-decay + platform alignment.
- match_type β
cve-exact/cpe-version/product-keyword. CVE-exact is the gold standard. - EDB β the Exploit-DB ID (click to open exploitdb.org).
Use Exploit-DB matches as search starters, not drop-in attack plans. Rank 1 is usually the best-fit historical exploit against your stack version.
Verbose logs
Click Show verbose to stream every log line: which endpoints were probed, which payloads fired, what the response looked like. Huge volume, but invaluable when you're debugging "why didn't it find X?".
Export + share
- Export report β HTML, PDF, DOCX, JSON. See Report formats.
- Share link β tenant-scoped URL + optional time-bound token. Sharing a scan never exposes tenant-wide data; the recipient only sees this scan.
What comes next
- Severity scale β how to triage by severity.
- Validation β deep-dive on how the Accuracy Gate works.
- Report formats β pick the right export for the audience.