Internet-exposed
Handles PII
Posture
critical
3
high
5
medium
10
low
3
Ownership
Findings (23)
high
JWT signed with weak HS256 secret
OWASP ZAPDAST
triaged
9.2
info
Path traversal in file download endpoint
CheckmarxSAST
open
6
medium
Missing CSP header on auth pages
SemgrepSAST
accepted
4.3
medium
Excessive Kubernetes RBAC privileges
SonarQubeSAST
open
6.5
low
IAM role with wildcard permissions
Scout SuiteCSPM
open
7.9
medium
JWT signed with weak HS256 secret
ProwlerCSPM
triaged
6.5
low
Open Redis without auth
GitleaksSecrets
false positive
9.9
high
S3 bucket publicly readable
ProwlerCSPM
false positive
4.7
critical
Cross-site Scripting in profile renderer
CheckmarxSAST
accepted
6.6
critical
Outdated lodash with prototype pollution
Burp SuiteDAST
open
10
high
Race condition in payment idempotency
SonarQubeSAST
open
9.2
medium
Outdated lodash with prototype pollution
Burp Pro PenTestPenTest
triaged
6.3
medium
Race condition in payment idempotency
ProwlerCSPM
false positive
7.3
critical
Open Redis without auth
CheckmarxSAST
triaged
8.2
medium
SQL Injection in user-input handler
Burp Pro PenTestPenTest
false positive
7.4
high
IAM role with wildcard permissions
OWASP ZAPDAST
open
6.9
info
SQL Injection in user-input handler
TruffleHogSecrets
triaged
5.3
medium
Path traversal in file download endpoint
OWASP ZAPDAST
open
9.1
high
Path traversal in file download endpoint
ProwlerCSPM
open
8.5
low
Open Redis without auth
DependabotSCA
accepted
5.5
medium
Cross-site Scripting in profile renderer
Scout SuiteCSPM
triaged
6.6