Scan any website for security vulnerabilities. Get actionable findings with fix recommendations specific to your tech stack.
Paste any URL, pick between Quick (~5s), Standard (~20s), or Comprehensive (~45s) scan depth. Each tier adds more modules for deeper analysis.
Some vulnerabilities only appear on authenticated pages. Two modes let you scan behind login: enter credentials for auto-login, or paste a session cookie or bearer token directly.
The scan runs 18 modules in sequence, streaming results as each one completes via Server-Sent Events. You see exactly which modules passed, which found issues, and how many findings each produced.
Results show a severity breakdown (Critical, High, Medium, Low, Info, Passed), detected technology stack, and action buttons for exporting or generating AI fix prompts.
Each finding expands to show a description, raw evidence, risk explanation, and a specific fix recommendation tailored to your detected tech stack.
Passed checks aren't just a count — each one shows exactly what was validated. From Content-Security-Policy directives to TLS versions, DMARC records to form security.
18 modules across three scan depths covering the most important web security surfaces.
CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy
Certificate validity, expiry, protocol version, issuer verification
HttpOnly, Secure, SameSite flags, prefix validation
Fingerprints 40+ technologies from headers, meta tags, and script patterns
Tests for overly permissive origins, credential leaks, wildcard misuse
Probes for exposed debug endpoints, admin panels, config files, API docs
SPF, DKIM, DMARC validation for email authentication
Scans inline and external scripts for 21 secret patterns (API keys, tokens, credentials)
Tests login, API, and sensitive endpoints for brute-force protection
Analyzes login forms for secure transport, CSRF protection, session handling
Probes common API paths and checks authentication requirements
Discovers subdomains and flags sensitive ones (admin, staging, internal)
Checks for CSRF tokens, autocomplete on sensitive fields, action URLs
Tests common redirect parameters for open redirect vulnerabilities
Checks error responses for stack traces, internal paths, debug info
Detects HTTP resources loaded on HTTPS pages
Checks for unencrypted WebSocket connections and missing auth
Detects known CVEs in client-side JavaScript libraries
Beyond scanning, several features help you act on findings quickly.
One-click export of all findings as a structured prompt for Claude Code, Cursor, or any AI coding assistant to fix issues automatically.
Export scan results as a formatted Markdown report for documentation, compliance, or sharing with your team.
Fix recommendations include code examples tailored to your detected tech stack (Next.js, Express, Nginx, etc.).
Automatically detects single-page apps with catch-all routes to prevent false positives from 200 responses on non-existent paths.
Scan pages behind login with username/password auto-login or manual cookie/token injection. Credentials are never stored.
Results stream via Server-Sent Events as each module completes — no waiting for the entire scan to finish.
Vulnerability Scanner performs passive security checks only. No exploitation is attempted.
Only scan websites you own or have explicit permission to test.