Overview
Relationship Mapping
Visualize connections between endpoints, parameters, and vulnerabilities.
Pattern Analysis
Query across assessments to find recurring vulnerability patterns.
Cross-Target Insights
Discover shared vulnerabilities across multiple applications.
Custom Queries
Write Cypher queries for custom security analysis.
Connecting to Neo4j
1
Get Connection Details
Navigate to Dashboard → Settings → Integrations → Neo4j.
2
Connect with Neo4j Browser
Open Neo4j Browser and connect:
3
Verify Connection
Run a test query:
You should see a count of nodes in your graph.
Data Model
The knowledge graph uses this schema:Node Types
| Node Type | Description |
|---|---|
Target | Root node for each target application |
Endpoint | Discovered URL/API endpoint |
Parameter | Input parameter (query, body, header) |
Request | Captured HTTP request |
Response | HTTP response data |
Vulnerability | Discovered security issue |
Evidence | Proof of exploitation |
Session | Authentication session |
Relationships
| Relationship | Description |
|---|---|
HAS_ENDPOINT | Target → Endpoint |
HAS_PARAMETER | Endpoint → Parameter |
SENT_REQUEST | Session → Request |
RECEIVED_RESPONSE | Request → Response |
HAS_VULNERABILITY | Endpoint → Vulnerability |
HAS_EVIDENCE | Vulnerability → Evidence |
Example Queries
Find all endpoints with SQL injection
Find all endpoints with SQL injection
List parameters vulnerable to XSS
List parameters vulnerable to XSS
Find endpoints with multiple vulnerabilities
Find endpoints with multiple vulnerabilities
Cross-target vulnerability patterns
Cross-target vulnerability patterns
Python SDK
Query the graph programmatically:Security Considerations
- Credentials are scoped to your organization only
- Read-only access by default
- All queries are logged
- Credentials can be rotated in dashboard settings