Security Auditor
Help Guide

1 Getting Started

Security Auditor is a combined Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) platform that identifies security vulnerabilities in your application code and web deployments. It performs 40+ security checks across two scanning modes.

The checks this tool performs overlap with the Open Web Application Security Project (OWASP) Top Ten; many checks map to common OWASP categories such as Injection, Cross-Site Scripting (XSS), Broken Authentication, and Security Misconfiguration.

Two Scanning Modes
Security Auditor landing page showing Local Directory mode selected

The Security Auditor landing page with Local Directory mode selected.

Supported file types for local scanning:
.py, .js, .ts, .java, .php, .go, .rb, .c, .cpp, .cs, .swift, .kt, .scala, .rs, .jsx, .tsx

2 Scanning a Local Directory

Use this mode to scan application source code files for security vulnerabilities using static analysis.

  1. Select Local Directory in the Analysis Mode panel on the left sidebar.
  2. Provide your code using one of two methods:
  3. Optionally toggle NVD Enriched Scan Results on or off (see Section 5).
  4. Click the Analyze button.
  5. Wait for the scan to complete. A progress indicator shows the current status.
Tip
When uploading files, you can select multiple files at once. The scanner analyses all uploaded files together, detecting cross-file vulnerability patterns.
Local directory scan results showing Analysis Summary and Security Findings

Results from a local directory scan showing the Analysis Summary, severity badges, and individual finding cards.

3 Scanning a Remote URL

Use this mode to dynamically test a running web application for security misconfigurations and vulnerabilities.

  1. Select Remote URL in the Analysis Mode panel.
  2. Enter the target web application URL in the Web Application URL field, e.g. https://your-app.example.com.
  3. Click the Analyze button.

What Gets Checked

Remote URL scan results showing missing security headers and other findings

Results from a remote URL scan showing missing security headers and insecure HTTP connection findings.

4 Understanding Your Results

Analysis Summary

After a scan completes, the Analysis Summary section appears at the top of the results. It displays metadata about the scan and a count of findings grouped by severity level.

Severity Badges

Below the metadata, colour-coded severity badges show how many findings fall into each severity level:

Critical High Medium Low Info

Finding Cards

Each detected vulnerability is displayed as a finding card containing the following information:

Exporting Reports

At the bottom of the results, two export options are available:

5 NVD Enrichment

The NVD Enriched Scan Results toggle in the sidebar controls whether scan findings are enriched with data from the NVD, maintained by the National Institute of Standards and Technology (NIST).

What NVD Enrichment Adds

When to Enable

When to Disable

Note
NVD enrichment adds processing time to the scan. The toggle is enabled by default. You can disable it for faster scans and re-run with enrichment when needed.

6 Severity Levels Guide

Findings are classified into five severity levels. Use this guide to prioritise remediation efforts.

Severity Description Examples
CRITICAL Immediate action required. These vulnerabilities can lead to full system compromise, data breaches, or remote code execution. SQL Injection, Command Injection, Hardcoded Credentials, Insecure Deserialization
HIGH Serious vulnerabilities requiring prompt attention. These can lead to significant data exposure or unauthorized access. Cross-Site Scripting (XSS), Path Traversal, SSRF, JWT Without Verification
MEDIUM Moderate risk requiring investigation. These may enable attacks under certain conditions or weaken security posture. CORS Misconfiguration, Weak Cryptographic Algorithm, Open Redirect, Missing Content-Security-Policy
LOW Minor issues with lower priority. These represent defence-in-depth concerns or best practice violations. Debug Mode Enabled, Missing Non-Critical Headers, Verbose Error Messages, Sensitive Data in Logs
INFO Informational findings with no direct security risk. These highlight areas for awareness or potential improvement. Technology Detection, Configuration Notes, Server Version Disclosure
Prioritisation Strategy
Address Critical and High findings first, as they pose the greatest risk. Medium findings should be reviewed and scheduled for remediation. Low and Info findings can be addressed as part of regular maintenance cycles.