Overview
The Analysis Phase combines AI-driven testing with human analyst verification:Analysis Modes
- Auto Mode
- Vuln Testing
- APT/Adv
Best for: Continuous security monitoringThe AI agent autonomously:
- Prioritizes high-risk endpoints
- Chains vulnerabilities together
- Adapts testing based on findings
- Optimizes for coverage vs depth
Recommended for CI/CD integration and regular assessments.
Vulnerability Categories
Injection Attacks
Injection Attacks
- SQL Injection: Error-based, blind, time-based, UNION-based
- NoSQL Injection: MongoDB, Redis command injection
- Command Injection: OS command execution
- LDAP Injection: Directory traversal
- XPath Injection: XML document exploitation
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
- Reflected XSS: URL parameter reflection
- Stored XSS: Persistent script injection
- DOM-based XSS: Client-side JavaScript manipulation
- Template Injection: Server-Side Template Injection (SSTI)
Access Control
Access Control
- IDOR: Insecure Direct Object References
- Privilege Escalation: Vertical/horizontal access bypass
- Forced Browsing: Unauthorized resource access
- Function-Level Access: Missing authorization checks
Server-Side Attacks
Server-Side Attacks
- SSRF: Server-Side Request Forgery
- XXE: XML External Entity injection
- File Inclusion: LFI/RFI vulnerabilities
- Path Traversal: Directory traversal attacks
Business Logic
Business Logic
- Race Conditions: TOCTOU vulnerabilities
- Workflow Bypass: State manipulation
- Parameter Pollution: HTTP parameter injection
- Mass Assignment: Object property manipulation
Authentication & Session
Authentication & Session
- Session Management: Fixation, prediction, hijacking
- Password Policies: Weak credentials
- Multi-Factor Bypass: 2FA implementation flaws
- JWT Attacks: Algorithm confusion, key leakage
Exploitation Evidence
Each validated finding includes comprehensive evidence:Proof of Concept
Working exploit code that demonstrates the vulnerability.
Screenshots
Visual evidence of successful exploitation.
Request/Response
Full HTTP traffic showing the attack and response.
Impact Analysis
Business impact assessment and risk scoring.
Human Analyst Verification
Critical findings receive human review:1
AI Detection
AI agent identifies potential vulnerability and creates initial finding.
2
Automated Validation
Exploit is verified through successful execution.
3
Confidence Scoring
Finding receives confidence score (Low/Medium/High/Critical).
4
Human Review
Security analyst verifies high-impact findings and refines context.
5
Remediation Guidance
Detailed fix recommendations with code examples added.
Real-Time Monitoring
Track analysis progress from the dashboard:- Live vulnerability count
- Coverage percentage
- Endpoints tested vs remaining
- Attack success rate