Skip to content
You're viewing a demo project. Sign up free to analyse your own codebase.
Security
54

Security Score

Needs attention

Security risks identified that need immediate attention

Fix the top 3 issues to gain +20 points and reach 74

2

Exposed secrets

87

Dependencies

No

Security tooling

2

High-severity findings

Findings (5)

2 high 2 medium 1 low
1 resolved 9d ago

Sorted by impact

+8 Hardcoded AWS access key in source code new high
+8 SQL query built with string concatenation new high
+4 Hardcoded JWT signing secret new medium
+4 eval() used to parse dynamic configuration new medium
+1 innerHTML assignment with user content low

Deterministic analysis scans up to 500 files. AI review interprets 10-15 high-signal files for contextual findings.

Complex security code

High complexity in security-sensitive code increases the risk of subtle bugs.

validateUserPermissions() 67 lines ●● 18
src/api/middleware/auth.ts:45
handleLoginAttempt() 75 lines ●● 14
src/auth/login.ts:23
resolveTokenPermissions() 57 lines ●● 12
src/auth/token.ts:88

From static analysis

4 known vulnerabilities

Structural checks

2 potential secrets detected in source code

Hardcoded credentials found in config files. These should be moved to environment variables and the commits containing them should be rotated.

3 dangerous API patterns detected

Found usage of eval(), innerHTML assignment and SQL string concatenation. These patterns can lead to injection vulnerabilities.

From automated scan of repository structure and configuration