Vulnerability Detection
Discover the powerful vulnerability detection features of Deflectra. We use the most advanced AI models to detect vulnerabilities in your codebase.
Vulnerability Patterns
SQL InjectionWEBAPIBLIBDESKTOPMOBILE
WEBAPIBLIBDESKTOPMOBILE
Analyze code where user-controlled input is used to construct database queries. Look for unsanitized input concatenation or ORM methods susceptible to injection. On mobile/desktop, check local SQLite/database usage.
NoSQL InjectionWEBAPIBLIB
WEBAPIBLIB
Analyze code where user-controlled input is used to construct queries in NoSQL databases (MongoDB, etc.). Look for insecure use of operators ($where, etc.) or construction of query objects with unsanitized data. Typically a backend vulnerability.
Command InjectionWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code where user-controlled input might be passed to system commands (e.g., exec, system, popen). Look for unsanitized input used in command strings. Check native code interactions on mobile/desktop or OS libraries.
Code InjectionWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code where user-controlled input is evaluated or executed directly (e.g., eval, exec, script engines) without proper validation or sandboxing. Check WebViews, dynamic code loading, or embedded scripting on mobile/desktop/libraries.
Insecure DeserializationWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code where serialized objects from untrusted sources (user input, files, network) are deserialized without proper validation, potentially leading to remote code execution (e.g., pickle, Java/PHP serialization). Can occur on client/server.
Server-Side Request Forgery (SSRF)WEBAPIBLIBMOBILEDESKTOP
WEBAPIBLIBMOBILEDESKTOP
Analyze code where user-controlled input (URLs, hostnames, paths) is used to make server-side HTTP requests to internal or external resources without proper validation. Check if mobile/desktop apps make requests based on external input.
Server-Side Template Injection (SSTI)WEB
WEB
Analyze code where user-controlled input is directly embedded into server-side templates without proper sanitization, potentially allowing code execution within the template engine.
Server-Side Includes (SSI) InjectionWEB
WEB
Analyze code or server configurations where user-controlled input might be included in files processed by the web server for SSI directives (e.g., <!--#include file="..." -->), potentially allowing file inclusion or command execution if SSI execution is enabled.
Hardcoded Secrets & CredentialsWEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
Scan code for hardcoded API keys, passwords, private keys, database connection strings, default credentials, or other sensitive secrets.
Path Traversal / File InclusionWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code where user-controlled input is used in file paths (reading, writing, including files) without proper sanitization, potentially allowing access to restricted files (LFI/RFI on server, local file access on mobile/desktop/libraries).
Client-Side Path TraversalWEBFLIBMOBILEDESKTOP
WEBFLIBMOBILEDESKTOP
Analyze client-side code (JavaScript) where user-controlled input (e.g., from URL fragments, parameters, postMessage) is used to construct URLs or paths for API requests or navigation, potentially leading to unintended resource access or redirection. Relevant for WebViews/JS frameworks on mobile/desktop.
XML External Entity (XXE) InjectionWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code that parses XML input (local or fetched). Check if external entity processing is disabled and if user input can influence XML structure leading to XXE.
Insecure File UploadsWEBAPIDESKTOPMOBILE
WEBAPIDESKTOPMOBILE
Analyze code handling file uploads (client-side checks, server-side validation). Check for validation of file types, names, sizes, and storage locations to prevent execution of uploaded files or path traversal.
Authentication BypassWEBAPIDESKTOPMOBILE
WEBAPIDESKTOPMOBILE
Analyze code for sensitive endpoints or functions lacking authentication checks (e.g., missing decorators, middleware). Check login flows, parameter manipulation, or local auth bypasses on mobile/desktop.
Account Management SecurityWEBAPIDESKTOPMOBILEWEB3
WEBAPIDESKTOPMOBILEWEB3
Analyze password policies, session termination, account deletion processes, and recovery mechanisms for security flaws. Includes local credential handling on desktop/mobile.
Authorization BypassWEBAPIDESKTOPMOBILEWEB3
WEBAPIDESKTOPMOBILEWEB3
Analyze code to verify that authorization checks (roles, permissions) are correctly applied server-side after authentication. Check for logic flaws allowing unauthorized access to functions or data. Check local authorization logic on desktop/mobile if applicable.
Privilege EscalationWEBAPIDESKTOPMOBILEOLIB
WEBAPIDESKTOPMOBILEOLIB
Analyze code for functions allowing insecure changes to roles/permissions or invocation of admin functions by lower-privileged users. Check local privilege handling on desktop/mobile/OS libraries.
Cross-Tenant Access Control Issues (if applicable)WEBAPIBLIB
WEBAPIBLIB
In multi-tenant applications (i.e., if the system supports tenants/organizations), analyze code to ensure all data queries and operations are strictly filtered by the authenticated user's tenant ID. If the application is not multi-tenant, this item may not be relevant.
Insecure Direct Object References (IDORs)WEBAPIDESKTOPMOBILE
WEBAPIDESKTOPMOBILE
Analyze code where user-controlled identifiers (IDs in URLs, parameters) are used to access resources without verifying the user's authorization for that specific resource. Check how desktop/mobile apps construct requests.
Account Takeover Logic FlawsWEBAPIDESKTOPMOBILE
WEBAPIDESKTOPMOBILE
Analyze functions like registration, profile modification, password reset, etc., for logic flaws enabling account takeover (predictable tokens, lack of verification, etc.). Includes local credential/token handling on desktop/mobile.
OTP/MFA BypassWEBAPIDESKTOPMOBILE
WEBAPIDESKTOPMOBILE
Analyze the logic for generating, verifying, and managing OTP/MFA codes for bypass vulnerabilities (rate limiting, predictability, skipping steps). Check client-side handling on desktop/mobile.
JWT Security IssuesWEBAPIBLIBDESKTOPMOBILE
WEBAPIBLIBDESKTOPMOBILE
Analyze JWT usage: signature verification (alg 'none', weak keys), claim validation (exp, iss, aud), insecure storage (e.g., localStorage, insecure mobile/desktop storage).
SAML Vulnerabilities (Code-Level)WEBAPIBLIB
WEBAPIBLIB
If SAML is used, analyze processing code: signature validation, XXE in parsing, ACS logic, condition/audience validation.
OAuth/OIDC Logic FlawsWEBAPIFLIBBLIBDESKTOPMOBILE
WEBAPIFLIBBLIBDESKTOPMOBILE
Analyze OAuth/OIDC flows: 'state' parameter validation (CSRF), insecure code handling, implicit flow issues, redirect URI validation. Check client-side implementation on mobile/web/desktop.
Insecure Tenant-Configurable IDP IntegrationWEBAPIBLIB
WEBAPIBLIB
Analyze multi-tenant apps with tenant-configurable IDPs (SAML/OIDC): configuration security (SSRF, redirects), parsing (XXE), assertion processing (signature bypass, claim injection), provisioning, Tenant ATO risks.
Potential Race Condition PatternsWEBAPIBLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBDESKTOPMOBILEOTHERWEB3
Analyze code for check-then-act sequences without locking, non-atomic operations, lack of DB constraints, potentially leading to inconsistent states or bypasses. Can occur client/server.
Cross-Site Scripting (XSS)WEBFLIBMOBILEDESKTOP
WEBFLIBMOBILEDESKTOP
Analyze code where user input is reflected in HTML/JS without proper contextual encoding (reflected, stored). Check WebViews, embedded browsers, or dynamic HTML rendering on mobile/desktop.
DOM-Based VulnerabilitiesWEBFLIBMOBILEDESKTOP
WEBFLIBMOBILEDESKTOP
Analyze client-side JS where input from sources (URL, postMessage) flows to sinks (eval, innerHTML, location) without sanitization (DOM-XSS, Open Redirect). Relevant for WebViews/JS frameworks on mobile/desktop.
CRLF InjectionWEBAPIBLIB
WEBAPIBLIB
Analyze code where user input is inserted into HTTP headers without sanitizing CR (\r) and LF (\n), allowing header injection or response splitting.
HTTP Header InjectionWEBAPIBLIB
WEBAPIBLIB
Analyze how the application processes and trusts incoming HTTP headers such as Host, X-Forwarded-For, X-Forwarded-Host, and other client-controllable headers. Look for vulnerabilities where manipulation of these headers can lead to bypassing security controls (e.g., IP-based restrictions), web cache poisoning, SSRF, incorrect application logic, or eliciting other unintended behaviors. Ensure headers are properly validated before use in security-sensitive contexts.
Open Redirect / Unvalidated RedirectsWEBAPIFLIBMOBILEDESKTOP
WEBAPIFLIBMOBILEDESKTOP
Analyze code where user input determines redirection targets without validation against an allow-list. Check WebViews/custom scheme handlers/embedded browsers on mobile/desktop.
Sensitive Information Leakage / Excessive Data ExposureWEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code for exposure of sensitive data: server details (errors, logs, comments), user info (verbose responses, PII exposure, insecure logging). Specifically, look for APIs or data structures that return more data than necessary for the functionality, such as exposing entire user objects/models (including sensitive fields like API keys, internal flags, or unnecessary PII) when only a subset of information is required. Check local storage/logs/configs on mobile/desktop.
Weak Cryptography UsageWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Scan code for weak algorithms (MD5, SHA1, DES), insecure modes (ECB), non-constant time comparisons, insecure randomness, lack of proper encryption/hashing for sensitive data.
Cross-Site Request Forgery (CSRF)WEBMOBILE
WEBMOBILE
Analyze state-changing requests: check anti-CSRF token implementation/validation, SameSite cookies, standard headers. Consider CSRF via mobile deeplinks or WebViews.
Security MisconfigurationWEBAPIBLIBOLIBDESKTOPMOBILEOTHER
WEBAPIBLIBOLIBDESKTOPMOBILEOTHER
Analyze code and configuration files (e.g., Nginx, cloud configs, Dockerfiles, IaC) for security misconfigurations such as debug modes, default credentials, insecure headers/cookies, permissive CORS, verbose errors, or improper permissions. Also, review mobile/desktop app manifests, build settings, and local application configurations.
LDAP InjectionWEBAPIBLIB
WEBAPIBLIB
Analyze code where user input constructs LDAP queries without sanitization. Typically a backend vulnerability.
Formula Injection (CSV Injection)WEBAPIBLIBFLIBDESKTOPMOBILE
WEBAPIBLIBFLIBDESKTOPMOBILE
Analyze code generating downloadable/exportable files (CSV, XLSX) using user input. Check sanitization/escaping of input starting with (=, +, -, @, =).
Vulnerabilities in Document GenerationWEBAPIBLIBFLIBDESKTOPMOBILE
WEBAPIBLIBFLIBDESKTOPMOBILE
Analyze code generating documents (PDF, DOCX) using libraries. Look for insecure input use leading to XSS, SSRF, command injection, or library exploits. Can occur client/server.
Integer Overflow/UnderflowWEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code (esp. C/C++, native mobile/desktop/libraries) for arithmetic operations on user-controlled numbers without bounds checking, potentially leading to bypasses or unexpected behavior.
Prototype Pollution (Client & Server-Side JS)WEBAPIFLIBBLIBMOBILEDESKTOP
WEBAPIFLIBBLIBMOBILEDESKTOP
(JavaScript/Node.js) Analyze code for patterns (recursive merge, property definition by path) where user input can modify global object prototypes (potential bypass, DoS, RCE). Relevant for WebViews/JS frameworks on mobile/desktop.
WebSocket Security (Code-Level)WEBAPIFLIBBLIBDESKTOPMOBILE
WEBAPIFLIBBLIBDESKTOPMOBILE
Analyze WebSocket handler code: input validation, authz checks, XSS in messages. Check for Cross-Site WebSocket Hijacking (CSWSH) via weak origin checks. Check client-side handling on desktop/mobile.
Insecure Cache ConfigurationWEBAPI
WEBAPI
Review application and server configuration files and related code for insecure cache settings. This includes improper Vary header usage, misconfigured framework cache settings, or incorrect explicit cache control headers that could lead to sensitive data being cached incorrectly, cache poisoning, or cache deception based on the configuration itself.
Potential Application-Level DoS PatternsWEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code for DoS patterns: ReDoS, expensive operations based on input without limits, resource exhaustion (zip bombs), algorithmic complexity attacks. Check local resource handling on desktop/mobile/libraries.
Mass AssignmentWEBAPIBLIB
WEBAPIBLIB
Analyze code where frameworks bind user input to objects/models. Check if filtering prevents setting internal/security-sensitive properties.
Improper Input Validation (Logic Impact)WEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIFLIBBLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze code where input type, format, length, or range isn't validated before use in logic, potentially altering control flow, bypassing rules, or causing inconsistent states.
Purchase & Pricing Logic FlawsWEBAPIMOBILEDESKTOP
WEBAPIMOBILEDESKTOP
Analyze payment/cart/pricing code. Check for client-side price manipulation bypasses, insecure validation of items/quantities, currency/rounding issues, discount/coupon abuse, and race conditions during the initial purchase process (e.g., using credits multiple times).
Subscription & Webhook Logic FlawsWEBAPIMOBILEDESKTOP
WEBAPIMOBILEDESKTOP
Analyze logic for third-party payment webhooks (e.g., Stripe, PayPal) and subscription lifecycle management. Verify webhook signature validation. Ensure all relevant events are handled to correctly update user/service status (e.g., charge.refunded, customer.subscription.deleted, invoice.payment_failed). Check for race conditions in status updates and insecure payment status validation.
Buffer Overflow (Heap/Stack)BLIBOLIBDESKTOPMOBILEOTHER
BLIBOLIBDESKTOPMOBILEOTHER
Analyze code (esp. C/C++, native mobile/desktop/libraries) for functions handling user input (strcpy, gets, memcpy) without bounds checking (memory corruption, code execution).
Use After FreeBLIBOLIBDESKTOPMOBILEOTHER
BLIBOLIBDESKTOPMOBILEOTHER
Analyze code (esp. C/C++, native mobile/desktop/libraries) for pointers used after freeing memory (crashes, data corruption, code execution).
Double FreeBLIBOLIBDESKTOPMOBILEOTHER
BLIBOLIBDESKTOPMOBILEOTHER
Analyze code (esp. C/C++, native mobile/desktop/libraries) for attempts to free the same memory region twice (memory corruption, exploitation).
Format String VulnerabilityBLIBOLIBDESKTOPMOBILEOTHER
BLIBOLIBDESKTOPMOBILEOTHER
Analyze code (esp. C/C++, native mobile/desktop/libraries) where user input is used directly as format string argument (printf, sprintf), allowing memory read/write.
Mobile Insecure Data StorageMOBILE
MOBILE
Analyze mobile app code for storage of sensitive data (credentials, PII, tokens) in insecure locations (e.g., SharedPreferences without encryption, external storage, logs, insecure databases) accessible to other apps or users with physical access.
Mobile Protection Bypass (Root/Jailbreak/Debug/Emulator)MOBILE
MOBILE
Analyze mobile app code for the presence and effectiveness of root/jailbreak detection, anti-debugging, and emulator detection mechanisms. Check if these checks can be easily bypassed (e.g., client-side checks only, predictable logic).
Mobile Deeplink VulnerabilitiesMOBILE
MOBILE
Analyze mobile app code handling custom URL schemes (deeplinks). Check for lack of input validation on parameters (potential for XSS, Path Traversal, SQLi if passed to backend), CSRF risks (if actions triggered without user intent), or Open Redirects.
Mobile WebView SecurityMOBILE
MOBILE
Analyze mobile app code using WebViews. Check if JavaScript execution is enabled (setJavaScriptEnabled(true)), if the JavaScript bridge (addJavascriptInterface) exposes sensitive native functions, and if content loaded is properly validated (potential for XSS, loading untrusted content).
Mobile Network Security (ATS/Cleartext/Pinning)MOBILE
MOBILE
Analyze mobile app network configuration and code. Check for disabled App Transport Security (ATS) on iOS, cleartext traffic allowed on Android, lack of certificate pinning, or insecure TLS/SSL configurations.
Mobile Insecure File Handling (External Sources)MOBILE
MOBILE
Analyze mobile app code that reads/processes files from external storage or locations accessible by other apps. Check for Path Traversal, lack of validation on file content, or insecure handling that could lead to code execution or data leakage if a malicious app modifies the file.
Mobile Insecure Inter-Process Communication (IPC)MOBILE
MOBILE
Analyze mobile app code using IPC mechanisms (e.g., Intents, Content Providers, Broadcast Receivers on Android; XPC on iOS). Check for improperly protected components (missing permissions, intent filters too broad), data leakage, or ability for malicious apps to send crafted messages to trigger unintended actions.
Mobile Biometric Authentication BypassMOBILE
MOBILE
Analyze mobile app code implementing biometric authentication. Check if the authentication result is validated server-side or if a client-side bypass is possible. Ensure fallback mechanisms are secure.
Reentrancy VulnerabilitiesWEB3
WEB3
Analyze smart contract code for reentrancy vulnerabilities, where external calls can re-enter the calling contract before the initial execution completes, potentially leading to state inconsistencies or fund drainage. Look for patterns like call-after-state-change instead of check-effects-interactions.
Smart Contract Integer Overflow/UnderflowWEB3
WEB3
Analyze smart contract code for integer overflow or underflow vulnerabilities in arithmetic operations, especially those involving token balances or critical calculations. Ensure use of safe math libraries.
Timestamp DependenceWEB3
WEB3
Analyze smart contract logic that relies on block.timestamp or block.number for critical operations (e.g., unlocking funds, determining winners). These can be manipulated by miners to some extent.
Gas Limit Issues & DoS in Smart ContractsWEB3
WEB3
Analyze smart contracts for functions or loops that might consume unbounded gas, leading to denial of service for users or the contract itself. Check for patterns like iterating over large arrays or complex computations that can exceed block gas limits.
Transaction-Ordering Dependence (Front-Running)WEB3
WEB3
Analyze smart contract logic for vulnerabilities where the outcome of a transaction can be influenced by the order in which transactions are mined. Look for scenarios where an attacker can observe a transaction and submit their own to exploit the system (e.g., decentralized exchanges, auctions).
Oracle ManipulationWEB3
WEB3
Analyze smart contracts that rely on external data sources (oracles). Check how data is fetched, validated, and used. Look for vulnerabilities where the oracle can be manipulated or its data can be influenced to exploit the contract.
Delegatecall VulnerabilitiesWEB3
WEB3
Analyze smart contract code using delegatecall. Ensure that the target contract's storage layout is compatible and that delegatecall is not used with untrusted contracts, which could lead to storage corruption or arbitrary code execution in the context of the calling contract.
Smart Contract Access Control IssuesWEB3
WEB3
Analyze smart contract functions for proper access control mechanisms (e.g., onlyOwner, require(msg.sender == authorized_address)). Look for sensitive functions that can be called by unauthorized users.
Smart Contract Logic ErrorsWEB3
WEB3
Perform a general review of the smart contract's business logic to identify flaws, edge cases, or unintended behaviors that could be exploited. This requires understanding the contract's intended purpose.
Weak On-Chain Randomness in Smart ContractsWEB3
WEB3
Analyze smart contracts that require randomness. Using on-chain sources like blockhash or block.timestamp for randomness can be predictable or influenced by miners. Check for reliance on such sources for critical security decisions.
HTTP Request Smuggling (Configuration)WEBAPI
WEBAPI
Analyze server, proxy, and application gateway configurations (e.g., Nginx, Apache, HAProxy, CloudFront, API Gateway configs, IaC like Terraform/CloudFormation) for settings that could enable HTTP Request Smuggling. Look for configurations that lead to ambiguous request parsing between frontend and backend systems, such as mishandling of Content-Length and Transfer-Encoding headers, or incorrect processing of chunked encoding. This can allow attackers to prepend or append data to other users' requests.
XSSi & XS-LeaksWEBAPIBLIB
WEBAPIBLIB
Analyze code for Cross-Site Script Inclusion (XSSi) and Cross-Site Leaks (XS-Leaks). Look for sensitive data (JSON, CSV, images) returned without proper isolation (e.g., missing X-Content-Type-Options: nosniff, COOP/COEP headers) or accessible via script tags/frames from other origins. Check for side-channels (timing, error events) that could leak information across origins.
Cloud Storage MisconfigurationWEBAPIBLIBOTHER
WEBAPIBLIBOTHER
Analyze Infrastructure as Code (IaC) or configuration files for insecure cloud storage settings (e.g., S3 buckets, Azure Blobs). Look for public access, lack of encryption, missing logging/versioning, or overly permissive bucket policies.
Cloud IAM & Permission MisconfigurationWEBAPIBLIBOTHER
WEBAPIBLIBOTHER
Analyze IaC and cloud configurations for overly permissive Identity and Access Management (IAM) policies. Look for use of wildcards (*), lack of least privilege, hardcoded IAM credentials, or insecure role assumption trust policies.
Container Security (Docker/K8s)WEBAPIBLIBOTHER
WEBAPIBLIBOTHER
Analyze Dockerfiles and Kubernetes manifests. Look for running as root, missing user directives, use of 'latest' tags, sensitive mounts, privileged mode, or lack of resource limits.
Infrastructure as Code (IaC) SecurityWEBAPIBLIBOTHER
WEBAPIBLIBOTHER
Analyze Terraform, CloudFormation, or other IaC files for security best practices. Look for unencrypted resources, open security groups (0.0.0.0/0), missing backups, or insecure default settings.
Parser ConfusionWEBAPIBLIBFLIB
WEBAPIBLIBFLIB
Analyze code to identify if the application uses different parsers for the same data format (e.g., JSON, YAML, XML) across different components (e.g., frontend vs. backend, proxy vs. application). Discrepancies in parsing can be exploited to bypass security controls, leading to vulnerabilities like authentication bypass, XSS, or SQL injection. For example, a proxy might see one set of parameters while the backend application sees another.
GraphQL Introspection EnabledAPIWEB
APIWEB
Check if the GraphQL endpoint has introspection enabled in production environments. Introspection allows attackers to query the entire schema, revealing all available queries, mutations, subscriptions, types, and fields. This information leakage significantly aids attackers in understanding the API and discovering potential vulnerabilities.
GraphQL Query Batching Abuse (DoS)APIWEB
APIWEB
Investigate if the GraphQL endpoint allows for query batching, where multiple queries can be sent in a single HTTP request. If not properly restricted, attackers can abuse this feature to execute a large number of complex queries simultaneously, overwhelming the server and causing a Denial of Service (DoS) attack.
Payment Logic FlawsWEBAPIMOBILEDESKTOP
WEBAPIMOBILEDESKTOP
Analyze payment/cart/pricing code: client-side price manipulation bypasses, insecure payment status validation, race conditions (discounts/credits), currency/rounding issues, quantity/item validation.
Test Code AnalysisWEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
Analyze test files (unit, integration, e2e) to understand business logic, edge cases, and potential security gaps. Look for commented-out security tests, tests for known bugs, or test data that reveals sensitive logic.
LLM/AI Security IssuesWEBAPIDESKTOPMOBILEOTHER
WEBAPIDESKTOPMOBILEOTHER
Analyze code interacting with Large Language Models (LLMs). Look for Prompt Injection vulnerabilities, insecure handling of LLM outputs (XSS via LLM), or leakage of sensitive context in prompts.
Documentation & Comment AnalysisWEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
WEBAPIBLIBFLIBOLIBDESKTOPMOBILEOTHERWEB3
Review project documentation and code comments. Discrepancies between documentation and implementation often reveal bugs or security issues. Comments may contain TODOs, warnings, or explanations of complex logic that hint at vulnerabilities.