πŸ›‘ Pentestas β€Ί help

Reading results

The Scan detail page is where most time is spent. It renders everything a single scan produced, organised so the highest-signal information is at the top.

Top-of-page summary

  • Target + status β€” URL, scan types, current phase, duration.
  • Finding counts by severity β€” five pills (CRITICAL β†’ INFO) with counts. Click one to filter the list below.
  • Attack chain map β€” if Pro+ AI is on, this is the first thing to read.
  • Action buttons β€” Rerun, Export report, Share link, Delete.

Attack chain mindmap

The mindmap is the single most important view on this page. It shows multi-step compromise paths β€” sequences of findings that, combined, escalate to a critical outcome.

Example: exposed .env file (LOW by itself) β†’ DB creds leaked β†’ database RCE via misconfigured extension = CRITICAL.

Read chains left-to-right. Node colour = severity. Click any node to jump to the underlying finding.

Chain synthesis is driven by rules + LLM validation. See Attack chain synthesis for details.

Findings list

Sorted by severity (CRITICAL first), with a per-row toolbar:

  • Verified badge β€” the finding was re-run through an independent verifier and still triggered. Filter for verified:true if you only want high-confidence items.
  • Proof block β€” HTTP request + response that demonstrates the issue. Sensitive bodies are encrypted at rest (per-tenant Fernet key).
  • CVSS score + vector β€” CVSS 3.1, calculated per-finding based on exploitability + impact context.
  • Validation steps β€” numbered reproduction checklist.
  • Exploit-DB matches β€” up to 5 ranked Exploit-DB candidates (CVE-exact, CPE+version, product keyword).
  • AI narrative (Pro+) β€” plain-English description of the impact.
  • AI remediation β€” actionable fix.
  • OWASP category + CWE β€” maps to OWASP Top 10 and CWE Top 25.

Finding validation

Every finding goes through the Accuracy Gate before persisting:

  1. Raw detection by the tool (e.g., SQLi payload reflected).
  2. Second-pass verifier runs an orthogonal probe (e.g., time-based boolean that can't hit on reflection alone).
  3. Junk filter β€” anything that looks like a CSS filename, HTML fragment, or null response body is dropped.
  4. Only survivors are written to the DB.

If a finding made it to the list, it survived that gate. The Verified badge additionally means a third-party tool (sqlmap, nuclei, metasploit-style check) confirmed it independently.

Exploit-DB matches

Each finding gets ranked Exploit-DB candidates. Column meanings:

  • confidence β€” 0.0–1.0, rolling up match type + CVE overlap + age-decay + platform alignment.
  • match_type β€” cve-exact / cpe-version / product-keyword. CVE-exact is the gold standard.
  • EDB β€” the Exploit-DB ID (click to open exploitdb.org).

Use Exploit-DB matches as search starters, not drop-in attack plans. Rank 1 is usually the best-fit historical exploit against your stack version.

Verbose logs

Click Show verbose to stream every log line: which endpoints were probed, which payloads fired, what the response looked like. Huge volume, but invaluable when you're debugging "why didn't it find X?".

Export + share

  • Export report β€” HTML, PDF, DOCX, JSON. See Report formats.
  • Share link β€” tenant-scoped URL + optional time-bound token. Sharing a scan never exposes tenant-wide data; the recipient only sees this scan.

What comes next