Documentation Index
Fetch the complete documentation index at: https://docs.vigolium.com/llms.txt
Use this file to discover all available pages before exploring further.
Vigolium ships with 235 scanner modules, 144 active and 91 passive, covering the OWASP Top 10 and beyond. Run vigolium module ls for the up-to-date enabled list (the registry can grow between releases without a docs refresh).
Active modules send modified requests to detect vulnerabilities; passive modules analyze existing request/response pairs without generating traffic. Recent additions include the MCP scanner suite, sensitive-header-leak detector, and DOM XSS confirm module, see vigolium module ls --tag mcp and --tag xss to view them.
Severity Scale
critical > high > medium > low > suspect > info
Confidence Scale
- certain - Definitively confirmed (payload executed, error matched)
- firm - Likely confirmed by behavioral analysis
- tentative - Possible but unconfirmed (heuristic-based)
Active Modules (144)
Active modules send modified requests to detect vulnerabilities via fuzzing, injection, and behavioral analysis. The list below is a curated highlight, run vigolium module ls --type active for the full list.
XSS
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-xss-light-url-params | XSS Light - URL Parameters | Reflected XSS in URL parameters with POST→GET conversion | High | Firm | xss, injection |
active-xss-light-path | XSS Light - Path Injection | Reflected XSS via path manipulation (recursive, cut, append) | High | Firm | xss, injection |
active-xss-light-param-discovery | XSS Light - Parameter Discovery | Reflected XSS via echo parameter discovery | High | Firm | xss, injection |
SQL Injection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-sqli-error-based | SQLi Error Based | Error-based SQLi via database error messages (MySQL, PostgreSQL, MSSQL, Oracle, SQLite) | Critical | Certain | sqli, injection |
active-sqli-boolean-blind | Blind SQL Injection (Boolean-Based) | Boolean-based blind SQLi via TRUE/FALSE payload pairs with triple verification | High | Certain | sqli, injection |
NoSQL Injection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-nosqli-error-based | NoSQLi Error Based | NoSQL injection via error messages (MongoDB, CouchDB, Cassandra) | Critical | Certain | nosqli, injection |
active-nosqli-operator-injection | NoSQL Operator Injection | MongoDB operator injection ($ne, $gt, $regex, $where) for auth bypass | High | Firm | nosqli, injection |
Template Injection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-reflected-ssti | Reflected SSTI | SSTI via math expression evaluation (e.g., {{7*7}}=49) | High | Certain | ssti, injection |
active-ssti-detection | SSTI Detection | Diff-based SSTI via Boolean Error-Based Blind technique | High | Certain | ssti, injection |
active-csti-detection | Client-Side Template Injection | CSTI in AngularJS/Vue.js applications via literal reflection | High | Firm | ssti, injection |
File Inclusion
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-lfi-generic | LFI Generic | LFI via path traversal payloads; matches known OS file signatures | Critical | Certain | lfi, injection |
active-lfi-path-traversal | LFI Path Traversal | Advanced LFI with null bytes, double encoding, Unicode bypass | High | Firm | lfi, injection |
Code Execution & Injection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-code-exec | Code Execution (RCE) | OS command injection via time-based blind (sleep/delay measurement) | Critical | Certain | rce, injection |
active-crlf-injection | CRLF Injection | CRLF injection in HTTP headers via CR/LF character sequences | Medium | Firm | injection |
active-xxe-generic | XXE Generic | XML external entity injection in generic XML endpoints | Critical | Certain | xxe, injection |
active-insecure-deserialization | Insecure Deserialization | Error-based detection for Java, PHP, Python, Ruby, and .NET deserialization | High | Firm | injection |
active-input-behavior-probe | Input Behavior Probe | Behavior change detection via header, path, debug param, and char probing | Suspect | Tentative | injection |
SSRF & Out-of-Band (OAST)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-ssrf-detection | SSRF Detection | SSRF via in-band probes (internal IPs, cloud metadata) with response differential | High | Firm | ssrf, injection |
active-oast-probe | OAST Probe | Blind vulnerabilities (blind SSRF, blind XXE, blind RCE) via DNS/HTTP callbacks | High | Certain | ssrf, injection |
active-proxy-pingback | Proxy Pingback | Open proxy/callback endpoints via OAST URL injection | High | Certain | ssrf, injection |
Misconfiguration
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-cors-misconfiguration | CORS Misconfiguration | Permissive CORS policies (reflected origins, null origin, wildcard+credentials) | Medium | Firm | misconfiguration |
active-spring-actuator-misconfig | Spring Actuator Misconfiguration | Exposed Spring Boot actuator endpoints leaking env vars, health, config | High | Firm | misconfiguration |
active-host-header-injection | Host Header Injection | Host header injection via value reflection (password reset/cache poisoning) | Medium | Firm | misconfiguration |
active-web-cache-poisoning | Web Cache Poisoning | Cache poisoning via unkeyed header injection (X-Forwarded-Host, X-Forwarded-Scheme) | High | Firm | misconfiguration |
Access Control
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-forbidden-bypass | 403/401 Forbidden Bypass | Bypass via path manipulation, header injection, method tampering | Medium | Firm | auth-bypass |
active-http-method-tampering | HTTP Method Tampering | Unexpectedly enabled HTTP methods (PUT, DELETE, PATCH) and overrides | Medium | Firm | auth-bypass |
active-csrf-verify | CSRF Token Verification | Verifies CSRF token enforcement by removing, emptying, or randomizing tokens | High | Firm | auth-bypass |
active-idor-detection | IDOR Detection | Missing authorization on object ID parameters via neighbor ID probing | High | Tentative | auth-bypass |
active-mass-assignment | Mass Assignment | Mass assignment via injecting privilege keys into JSON APIs | High | Firm | auth-bypass |
active-open-redirect | Open Redirect | Open redirect via injected external URL in Location/meta refresh | Medium | Firm | auth-bypass |
Path Analysis
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-path-normalization | Path Normalization | Path normalization vulnerabilities via traversal payloads against middleware/reverse proxy | High | Firm | misconfiguration |
active-nginx-off-by-slash | Nginx Off-by-Slash | Nginx alias traversal via missing trailing slash | High | Tentative | misconfiguration |
active-nginx-path-escape | Nginx Path Escape Detection | Diff-based detection for alias traversal, URL encoding bypass, semicolon injection | High | Firm | misconfiguration |
Differential & Behavior Detection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-smart-behavior-detection | Smart Behavior Detection | Diff-based injection detection via true/false behavioral payload pairs | Suspect | Firm | detection |
active-suspect-transform | Suspect Transform Detection | Expression evaluation, quote consumption, and unicode normalizations | Suspect | Firm | detection |
active-backslash-transformation | Backslash Transformation | Escape sequence interpretation, backslash consumption, character handling | Suspect | Firm | detection |
Prototype Pollution
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-prototype-pollution | Prototype Pollution | Server-side prototype pollution via __proto__ and constructor.prototype JSON injection | High | Firm | javascript, injection |
active-client-prototype-pollution | Client-Side Prototype Pollution | Client-side prototype pollution via JavaScript static analysis (source + gadget patterns) | High | Firm | javascript, injection |
Race Conditions
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-race-interference | Race Interference Detection | Race conditions via parallel request analysis (input storage, cross-contamination, TOCTOU) | High | Firm | injection |
XML, JWT & HTTP Protocol
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-xml-saml-security | XML SAML Security | XXE and DTD injection in SAML XML processing | High | Firm | injection |
active-jwt-vulnerability | JWT Vulnerability | JWT algorithm confusion (none algorithm, empty signature, RS256→HS256) | Critical | Certain | injection |
active-http-request-smuggling | HTTP Request Smuggling | CL.TE and TE.CL desync via conflicting Content-Length and Transfer-Encoding | High | Firm | injection |
API & Endpoint Security
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-graphql-scan | GraphQL Security Scanner | GraphQL introspection, SQL injection, and query batching abuse | Medium | Certain | api, injection |
active-file-upload-scan | File Upload Scanner | File upload bypass (extension, null byte, magic bytes, SVG XXE, HTML XSS) | High | Certain | injection |
active-default-credentials | Default Credentials | Login endpoints tested with common credential pairs; CAPTCHA/lockout aware | High | Certain | auth-bypass |
active-sensitive-file-discovery | Sensitive File Discovery | ~25 marker-based sensitive files and ~1,350 generic paths (.env, .git, logs) | Medium | Firm | info-disclosure |
active-jsonp-callback | JSONP Callback Injection | JSONP endpoints via callback injection enabling cross-origin data theft | Medium | Firm | injection |
Proxy & Utility
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-proxy | Proxy | Replay all requests through configured proxy | Info | Firm | utility, light |
active-proxy-header-trust | Proxy Header Trust | Cross-framework proxy header trust issues via X-Forwarded-* manipulation | High | Firm | misconfiguration, moderate |
active-api-rate-limit-bypass | API Rate Limit Bypass | Rate limiting bypass via IP spoofing headers | Medium | Firm | auth-bypass, moderate |
active-websocket-security | WebSocket Security | Insecure WebSocket upgrade policies and missing origin validation | High | Firm | misconfiguration, light |
active-swagger-disclose | Swagger Disclosure | Exposed Swagger/OpenAPI documentation | Medium | Firm | api, info-disclosure, light |
active-backup-file-discovery | Backup File Discovery | Exposed backup archives derived from hostname and year variants | High | Firm | sensitive-file, moderate |
active-angular-template-injection | Angular Template Injection | Angular template injection via expression evaluation | High | Firm | angular, injection, ssti |
SQL Injection (Time-Based)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-sqli-time-based-header | SQLi Time Based - Header | Time-based SQL injection in HTTP headers | Critical | Certain | injection, sqli, heavy |
active-sqli-time-based-params | SQLi Time Based - Params | Time-based SQL injection in parameters | Critical | Certain | injection, sqli, heavy |
active-sqli-time-blind | Blind SQL Injection (Time-Based) | Time-based blind SQL injection | High | Firm | injection, sqli, heavy |
SSRF & SSTI (Blind)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-ssrf-blind | Blind SSRF Detection | Blind SSRF via OAST callbacks | High | Firm | ssrf, injection, heavy |
active-ssti-blind | Blind SSTI | Blind SSTI via OAST callbacks and time-delay payloads | Critical | Firm | injection, ssti, heavy |
Framework Security
Next.js
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-nextjs-data-leakage | Next.js Data Route Leakage | Unauthorized access to /_next/data/<buildId>/<path>.json | High | Firm | nextjs, javascript |
active-nextjs-middleware-bypass | Next.js Middleware Bypass | CVE-2025-29927 and path normalization bypasses | Critical | Firm | nextjs, javascript |
active-nextjs-image-ssrf | Next.js Image Optimizer SSRF | SSRF via /_next/image with OAST and in-band probes | High | Firm | nextjs, javascript |
active-nextjs-draft-mode-exposure | Next.js Draft Mode Exposure | Insecure or unprotected Draft/Preview Mode endpoints | High | Firm | nextjs, javascript |
nextjs-version-audit | Next.js Version Audit | Fingerprints Next.js version and maps to known CVE advisories | High | Firm | nextjs, javascript, fingerprint |
active-js-devserver-exposure | JS Dev Server Exposure | Exposed webpack HMR, Vite, Nuxt, Remix dev server endpoints | Medium | Firm | javascript |
Spring / Java
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-spring-actuator-misconfig | Spring Actuator Misconfiguration | Exposed Spring Boot actuator endpoints | High | Firm | spring, java |
active-spring-boot-admin-exposure | Spring Boot Admin Exposure | Exposed Spring Boot Admin dashboards | High | Firm | spring, java |
active-spring-cloud-config-exposure | Spring Cloud Config Exposure | Exposed Config Server endpoints leaking secrets | Critical | Firm | spring, java |
active-spring-data-rest-exposure | Spring Data REST Exposure | Auto-exposed repository endpoints with HAL/HATEOAS | Medium | Firm | spring, java |
active-spring-debug-exposure | Spring Debug Exposure | Debug endpoints, Whitelabel errors, stack traces | Medium | Firm | spring, java |
active-spring-gateway-exposure | Spring Gateway Exposure | Exposed Cloud Gateway actuator revealing routes | High | Firm | spring, java |
active-spring-h2-console-exposure | Spring H2 Console Exposure | Exposed H2 database web consoles | Critical | Firm | spring, java, rce |
active-spring-jolokia-exposure | Spring Jolokia Exposure | Exposed Jolokia JMX endpoints | High | Firm | spring, java |
active-java-appserver-console | Java App Server Console | Exposed admin consoles (WildFly, WebLogic, GlassFish) | High | Firm | java, tomcat |
active-java-sensitive-files | Java Sensitive Files | Java config files, WEB-INF, META-INF, build artifacts | High | Firm | java, sensitive-file |
active-tomcat-manager-exposure | Tomcat Manager Exposure | Exposed Tomcat Manager and Host Manager interfaces | High | Firm | tomcat, java |
Django / Flask / FastAPI (Python)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
django-admin-exposure | Django Admin Exposure | Exposed Django admin panel and login page | Medium | Firm | django, python |
django-browsable-api-exposure | Django Browsable API Exposure | DRF browsable API detected via Accept header | Low | Firm | django, python |
django-debug-exposure | Django Debug Exposure | Django DEBUG=True information disclosure | High | Firm | django, python |
django-debug-toolbar-exposure | Django Debug Toolbar Exposure | Exposed django-debug-toolbar panels | High | Firm | django, python |
flask-werkzeug-debugger | Flask Werkzeug Debugger | Exposed Werkzeug interactive debugger (RCE) | Critical | Certain | flask, python, rce |
fastapi-docs-exposure | FastAPI Docs Exposure | Exposed FastAPI interactive API documentation | Low | Firm | fastapi, python |
fastapi-auth-inconsistency | FastAPI Auth Inconsistency | Unprotected operations found via OpenAPI schema | Medium | Firm | fastapi, python |
Laravel / Symfony / PHP
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-laravel-admin-exposure | Laravel Admin Exposure | Exposed admin panels, API docs, GraphQL endpoints | High | Firm | laravel, php |
active-laravel-devtool-exposure | Laravel Developer Tool Exposure | Exposed Web Tinker, Clockwork, Pulse, Log Viewer | High | Firm | laravel, php |
active-laravel-ignition-rce | Laravel Ignition RCE | CVE-2021-3129 RCE via exposed Ignition endpoints | Critical | Firm | laravel, php, rce |
active-laravel-misconfig | Laravel Misconfiguration | Debug mode, exposed debugbar, application logs | High | Firm | laravel, php |
active-laravel-sensitive-files | Laravel Sensitive Files | PHPUnit config, SQLite DB, storage internals | High | Firm | laravel, php |
active-symfony-misconfig | Symfony Misconfiguration | Exposed profiler, debug toolbar, dev front controller | High | Firm | symfony, php |
active-php-composer-exposure | PHP Composer Exposure | Exposed Composer manifests, vendor directory | High | Firm | php |
active-php-debug-exposure | PHP Debug Exposure | Exposed phpinfo, PHP-FPM status, phpMyAdmin | Medium | Firm | php |
active-php-framework-debug | PHP Framework Debug Exposure | Debug endpoints for Yii, CodeIgniter, CakePHP | Medium | Firm | php |
active-php-path-info-misconfig | PHP PATH_INFO Misconfiguration | cgi.fix_pathinfo routing ambiguity | Medium | Firm | php |
active-php-source-disclosure | PHP Source Disclosure | PHP source code via .phps handlers | High | Firm | php |
Rails (Ruby)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-rails-info-exposure | Rails Info Exposure | Exposed Rails dev/debug endpoints in production | High | Firm | rails, ruby |
active-rails-admin-dashboard | Rails Admin Dashboard | Exposed Rails ecosystem admin panels | High | Firm | rails, ruby |
active-rails-sensitive-files | Rails Sensitive Files | Exposed Rails config, credentials, artifacts | Critical | Firm | rails, ruby |
active-rails-action-mailbox-probe | Rails Action Mailbox Probe | Exposed Action Mailbox ingress endpoints | Medium | Firm | rails, ruby |
active-rails-active-storage-probe | Rails Active Storage Probe | Exposed Active Storage direct upload endpoints | Medium | Firm | rails, ruby |
Express (Node.js)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-express-debug-probe | Express Debug Probe | Stack trace and debug info leakage | Low | Firm | express, javascript |
active-express-directory-listing | Express Directory Listing | Directory listing via serve-index middleware | Low | Firm | express, javascript |
active-express-trust-proxy-misconfig | Express Trust Proxy Misconfiguration | Trust proxy misconfiguration via X-Forwarded-* | Medium | Firm | express, javascript |
ASP.NET / IIS
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-aspnet-blazor-exposure | ASP.NET Blazor Exposure | Exposed Blazor WebAssembly assemblies and Server endpoints | Medium | Firm | aspnet |
active-aspnet-health-exposure | ASP.NET Health Endpoint Exposure | Exposed health checks, monitoring dashboards, metrics | Medium | Firm | aspnet |
active-aspnet-identity-probe | ASP.NET Identity Probe | Exposed Identity endpoints and IdentityServer | Medium | Firm | aspnet |
active-aspnet-misconfig | ASP.NET Misconfiguration | Exposed diagnostics, debug endpoints, verbose errors | High | Firm | aspnet |
active-aspnet-sensitive-files | ASP.NET Sensitive Files | Exposed config files, backups, sensitive directories | High | Firm | aspnet |
active-aspnet-service-exposure | ASP.NET Service Exposure | Exposed ASMX, WCF, OData, legacy service paths | Medium | Firm | aspnet |
active-aspnet-viewstate-scan | ASP.NET ViewState Scan | ViewState MAC disabled, event validation bypass | High | Firm | aspnet |
active-iis-shortname-discovery | IIS Short Filename Discovery | IIS 8.3 short filename enumeration via tilde oracle | Medium | Certain | aspnet |
Firebase
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-firebase-auth-misconfig | Firebase Auth Misconfiguration | Firebase Authentication misconfigurations | Medium | Firm | firebase |
active-firebase-functions-exposure | Firebase Functions Exposure | Unauthenticated Cloud Functions | High | Firm | firebase |
active-firebase-misconfig | Firebase Misconfiguration | Exposed Firebase config, security rules, credentials | High | Firm | firebase |
active-firebase-rtdb-exposure | Firebase RTDB Exposure | Publicly readable Realtime Database | Critical | Certain | firebase |
active-firebase-storage-exposure | Firebase Storage Exposure | Publicly accessible Cloud Storage buckets | High | Certain | firebase, cloud |
Cloud Infrastructure
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-cloud-bucket-takeover | Cloud Bucket Takeover | Dangling cloud storage buckets vulnerable to takeover | High | Firm | cloud |
active-cloud-origin-bypass | Cloud Origin Bypass | Direct access to origins bypassing CDN security | Medium | Firm | cloud |
active-cloud-public-read | Cloud Public Read | Publicly readable sensitive paths on cloud storage | High | Firm | cloud |
active-cloud-storage-listing | Cloud Storage Listing | Publicly listable S3 buckets and Azure containers | High | Certain | cloud |
CMS (WordPress, Drupal, Joomla, Magento)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
active-wp-misconfig | WordPress Misconfiguration | Exposed config files, debug logs, dangerous endpoints | High | Firm | wordpress, php |
active-wp-user-enum | WordPress User Enumeration | User enumeration via author archives and REST API | Medium | Certain | wordpress, php |
active-wp-xmlrpc | WordPress XML-RPC Abuse | XML-RPC multicall brute-force and pingback abuse | Medium | Firm | wordpress, php |
active-wp-ajax-exposure | WordPress AJAX Action Exposure | Publicly accessible AJAX actions from plugins | High | Firm | wordpress, php |
active-drupal-misconfig | Drupal Misconfiguration | Exposed config files, update scripts, installer | High | Firm | drupal, php |
active-drupal-user-enum | Drupal User Enumeration | User enumeration via user profiles and JSON:API | Medium | Certain | drupal, php |
active-joomla-misconfig | Joomla Misconfiguration | Exposed config backups, log/temp dirs, debug settings | High | Firm | joomla, php |
active-joomla-user-enum | Joomla User Enumeration | User enumeration via registration, API, admin login | Medium | Firm | joomla, php |
active-magento-misconfig | Magento Misconfiguration | Exposed setup wizard, downloader, version files | High | Firm | magento, php |
active-cms-installer-exposure | CMS Installer Exposure | Exposed WordPress, Drupal, and Joomla install wizards | Critical | Firm | wordpress, drupal, joomla |
Passive Modules (91)
Passive modules analyze existing request/response pairs without sending new traffic.
XSS
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-dom-xss-detect | DOM XSS Detect | DOM XSS source-to-sink data flows (location.hash, innerHTML, eval, document.write) | Medium | Firm | xss |
Authentication & Session
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-auth-headers-detect | Auth Headers Detect | Authorization headers (Bearer tokens, API keys) in requests | High | Firm | session, auth |
passive-jwt-weak-secret | JWT Weak Secret Detection | Offline brute-force of JWT HMAC secrets against ~104K wordlist | High | Firm | session, auth |
passive-cookie-security-detect | Cookie Security Detect | Insecure cookie attributes (missing Secure, HttpOnly, SameSite) | Low | Certain | session, auth |
passive-cacheable-https-detect | Cacheable HTTPS Response | Sensitive HTTPS responses without proper Cache-Control | Low | Firm | session, auth |
passive-password-autocomplete-detect | Password Autocomplete | Password fields without autocomplete="off" | Info | Certain | session, auth |
Injection Signals
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-sql-syntax-detect | SQL Syntax in Request | SQL statements/keywords in HTTP request parameter values | Info | Firm | injection |
passive-serialized-object-detect | Serialized Object Detection | Serialized Java/PHP/.NET/Python objects in request parameters | Medium | Firm | injection |
passive-input-reflection-detect | Input Reflection Detect | Request parameter values reflected verbatim in response bodies | Info | Tentative | injection |
passive-base64-data-detect | Base64 Data Detect | Interesting base64 data (JSON, PHP objects, URLs, Java objects) in requests/responses | Info | Tentative | injection |
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-secret-detect | Secret Detection | Leaked secrets, API keys, and credentials via Kingfisher engine | High | Firm | info-disclosure |
passive-info-disclosure-detect | Info Disclosure Detect | Server versions, internal IPs, stack traces, debug information | Low | Firm | info-disclosure |
passive-error-message-detect | Error Message Detect | Error messages from debug pages, Apache, ASP.NET, Java, PHP, Ruby, Node.js, SQL | Info | Firm | info-disclosure |
passive-sourcemap-detect | Sourcemap Exposure | Exposed JavaScript sourcemaps via SourceMappingURL references | Low | Firm | info-disclosure |
passive-sensitive-url-params | Sensitive URL Params | Passwords, tokens, API keys passed in URL query parameters | Medium | Firm | info-disclosure |
passive-content-type-mismatch | Content Type Mismatch | Content-Type/body mismatches enabling MIME confusion attacks | Low | Firm | info-disclosure |
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-security-headers-missing | Security Headers Missing | Missing X-Content-Type-Options, X-Frame-Options, HSTS, CSP, Permissions-Policy | Info | Certain | header-security |
passive-mixed-content-detect | Mixed Content Detect | HTTP resources loaded on HTTPS pages (src, href, action attributes) | Low | Certain | header-security |
CORS & Redirect
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-cors-headers-detect | CORS Headers Detect | Permissive CORS headers (wildcard origin, credentials enabled) | Low | Firm | cors |
passive-openredirect-params | Open Redirect Params | URL parameter names associated with open redirects (redirect, url, next, goto) | Info | Tentative | cors |
passive-oauth-facebook-detect | Facebook OAuth Detect | Facebook OAuth redirect parameters for OAuth flow analysis | Medium | Firm | cors |
Access Control
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-csrf-detect | CSRF Detection | State-changing requests (POST/PUT/DELETE/PATCH) missing anti-CSRF protections | Medium | Tentative | auth-bypass |
passive-idor-params-detect | IDOR Parameter Detection | Parameters referencing object identifiers for IDOR/BOLA triage | Info | Tentative | auth-bypass |
Cryptography
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-crypto-weakness-detect | Cryptographic Weakness | PHP magic hashes, weak MD5/SHA1, padding oracle errors, unprotected encrypted cookies | Medium | Tentative | crypto |
Anomaly Detection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-anomaly-ranking | Anomaly Ranking | Statistical anomaly detection across per-host response batches; updates risk_score | Suspect | Tentative | detection |
JS Framework Security (Runtime Analysis)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-js-framework-fingerprint | JS Framework Fingerprint | Identifies Next.js, Nuxt, Angular, React, Remix, SvelteKit, Gatsby; extracts buildId | Info | Certain | javascript |
passive-ssr-data-exposure | SSR Data Exposure | Sensitive data in SSR state blobs (__NEXT_DATA__, __NUXT__, __INITIAL_STATE__) | Medium | Firm | javascript |
passive-cache-auth-misconfiguration | Cache-Auth Misconfiguration | Cacheable responses with user-specific data missing Vary headers | Medium | Firm | javascript |
passive-server-action-auth | Server Action Auth Check | Next.js Server Actions with mutation operations but no authorization | High | Tentative | javascript |
passive-nextjs-config-audit | Next.js Config Audit | Insecure Next.js config (dangerouslyAllowSVG, wildcard image domains, prod sourcemaps) | Medium | Firm | javascript |
passive-client-auth-guard | Client Auth Guard Check | Client-only auth guards (useEffect redirects) without server-side enforcement | High | Tentative | javascript |
passive-cache-data-leak | Cache Data Leak | getStaticProps/force-static with auth, unstable_cache without user-scoped keys | Medium | Tentative | javascript |
JS Framework Security (Source Analysis)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-unsafe-html-sink | Unsafe HTML Sink | Raw HTML injection sinks: dangerouslySetInnerHTML, v-html, {@html}, innerHTML | High | Firm | javascript |
passive-insecure-token-storage | Insecure Token Storage | Auth tokens stored in localStorage/sessionStorage | Medium | Firm | javascript |
passive-env-secret-exposure | Environment Secret Exposure | Secrets in NEXT_PUBLIC_, VITE_, REACT_APP_ public env vars; served .env files | High | Firm | javascript |
passive-build-misconfig-detect | Build Misconfiguration | Prod sourcemaps, dev mode in production, SVG XSS risk, broad image remotePatterns | High | Firm | javascript |
Framework Fingerprinting
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-aspnet-fingerprint | ASP.NET Fingerprint | Fingerprints ASP.NET version and configuration | Info | Firm | aspnet, fingerprint |
passive-aspnet-viewstate-detect | ASP.NET ViewState Detect | Analyzes ViewState fields for security issues | Medium | Firm | aspnet |
passive-django-fingerprint | Django Fingerprint | Fingerprints Django framework indicators | Info | Firm | django, python, fingerprint |
passive-express-fingerprint | Express Fingerprint | Fingerprints Express.js indicators | Info | Firm | express, fingerprint |
passive-fastapi-fingerprint | FastAPI Fingerprint | Fingerprints FastAPI framework indicators | Info | Firm | fastapi, python, fingerprint |
passive-firebase-fingerprint | Firebase Fingerprint | Fingerprints Firebase SDK usage and config | Info | Firm | firebase, fingerprint |
passive-flask-fingerprint | Flask Fingerprint | Fingerprints Flask framework indicators | Info | Firm | flask, python, fingerprint |
passive-laravel-fingerprint | Laravel Fingerprint | Fingerprints Laravel framework indicators | Info | Firm | laravel, php, fingerprint |
passive-rails-fingerprint | Rails Fingerprint | Fingerprints Rails framework indicators | Info | Firm | rails, ruby, fingerprint |
passive-spring-fingerprint | Spring Fingerprint | Fingerprints Spring Boot indicators | Info | Firm | spring, java, fingerprint |
passive-drupal-fingerprint | Drupal Fingerprint | Fingerprints Drupal CMS indicators | Info | Firm | drupal, php, fingerprint |
passive-joomla-fingerprint | Joomla Fingerprint | Fingerprints Joomla CMS indicators | Info | Firm | joomla, php, fingerprint |
passive-wp-fingerprint | WordPress Fingerprint | Fingerprints WordPress CMS indicators | Info | Firm | wordpress, php, fingerprint |
API & Protocol Analysis
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-api-version-detect | API Version Detection | Detects API versioning patterns in URLs and headers | Info | Firm | api |
passive-graphql-introspection-detect | GraphQL Introspection Detect | Detects enabled GraphQL introspection | Medium | Certain | api, graphql |
passive-grpc-web-detect | gRPC-Web Detect | Detects gRPC-Web traffic patterns | Info | Firm | api |
passive-endpoint-classifier | Endpoint Classifier | Classifies endpoint types (API, auth, admin, static) | Info | Tentative | api |
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-csp-weakness-audit | CSP Weakness Audit | Content-Security-Policy weaknesses and bypasses | Medium | Firm | header-security |
passive-permissions-policy-detect | Permissions-Policy Detect | Missing or weak Permissions-Policy/Feature-Policy | Info | Certain | header-security |
passive-hsts-preload-audit | HSTS Preload Audit | HSTS header configuration and preload readiness | Info | Firm | header-security |
passive-referrer-policy-detect | Referrer-Policy Detect | Missing or weak Referrer-Policy | Info | Firm | header-security |
passive-subresource-integrity-detect | Subresource Integrity Detect | Scripts/styles loaded without SRI attributes | Low | Firm | header-security |
passive-cors-vary-origin-missing | CORS Vary: Origin Missing | CORS responses without Vary: Origin header | Low | Firm | cors, header-security |
Cloud & Firebase
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-cloud-storage-fingerprint | Cloud Storage Fingerprint | Identifies cloud storage provider from URLs/headers | Info | Firm | cloud, fingerprint |
passive-cloud-storage-error-info | Cloud Storage Error Info | Cloud storage error messages revealing bucket names | Low | Firm | cloud, info-disclosure |
passive-cloud-signed-url-leak | Cloud Signed URL Leak | Cloud signed URLs with excessive permissions or long expiry | Medium | Firm | cloud, info-disclosure |
CMS Detection
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-drupal-api-detect | Drupal API Detect | Detects Drupal JSON:API and REST endpoints | Info | Firm | drupal, api |
passive-joomla-api-detect | Joomla API Detect | Detects Joomla API endpoints and versions | Info | Firm | joomla, api |
passive-wp-rest-api-detect | WordPress REST API Detect | Detects WordPress REST API endpoints | Info | Firm | wordpress, api |
Advanced JS Framework Analysis
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-nextjs-dynamic-param-audit | Next.js Dynamic Param Audit | Audits Next.js dynamic route parameters for injection | Medium | Tentative | nextjs, javascript |
passive-nextauth-config-audit | NextAuth.js Config Audit | Audits NextAuth.js configuration for security issues | Medium | Firm | nextjs, javascript |
passive-nuxt-config-audit | Nuxt Config Audit | Audits Nuxt.js configuration for security issues | Medium | Firm | nuxt, javascript |
passive-remix-loader-exposure | Remix Loader Exposure | Detects exposed Remix loader data | Medium | Firm | remix, javascript |
passive-ssr-hydration-xss | SSR Hydration XSS | Detects XSS via SSR hydration mismatches | High | Firm | javascript, xss |
passive-server-action-bind-audit | Server Action Bind Audit | Audits Next.js Server Action .bind() usage for security | Medium | Tentative | nextjs, javascript |
passive-server-action-input-audit | Server Action Input Audit | Audits Next.js Server Action input validation | Medium | Tentative | nextjs, javascript |
passive-server-only-boundary-audit | Server-Only Boundary Audit | Audits server-only module boundary enforcement | Medium | Tentative | nextjs, javascript |
passive-javascript-uri-sink | JavaScript URI Sink | Detects javascript: URI usage in links and event handlers | High | Firm | javascript, xss |
passive-wasm-module-detect | WebAssembly Module Detect | Detects WebAssembly module loading | Info | Firm | javascript |
Session & Authentication (Passive)
| Module ID | Name | Description | Severity | Confidence | Tags |
|---|
passive-express-session-audit | Express Session Audit | Audits Express session cookie configuration | Medium | Firm | express, session |
passive-jwt-claims-detect | JWT Claims Detect | Analyzes JWT payload claims for security issues | Info | Firm | auth, session |
passive-jackson-deserialize-detect | Jackson Deserialization Detect | Detects Jackson default typing indicators | Medium | Firm | java, injection |
passive-python-debug-detect | Python Debug Detect | Detects Python debug/traceback indicators | Low | Firm | python |
passive-rails-debug-detect | Rails Debug Detect | Detects Rails debug page indicators | Medium | Firm | rails, ruby |
passive-rails-action-cable-detect | Rails Action Cable Detect | Detects Rails Action Cable WebSocket endpoints | Info | Firm | rails, ruby |
passive-rails-active-storage-detect | Rails Active Storage Detect | Detects Active Storage blob URLs and signed tokens | Info | Firm | rails, ruby |
passive-sensitive-api-fields-detect | Sensitive API Fields Detect | Detects sensitive field names in API responses | Medium | Tentative | api, info-disclosure |