This is a demo page showing sample scan results from an intentionally vulnerable educational application. The data shown here is for demonstration purposes only.
Quick summary of security issues found in your code using static code analysis tools. Start here to see the most important problems to fix first, understand what types of vulnerabilities exist, and get actionable recommendations.
Comprehensive technical report with detailed analysis, remediation steps, and security best practices. Perfect for sharing with your team or for deeper understanding of each vulnerability.
Severity levels explained:
CWE and OWASP are industry-standard classifications that help you understand the type of vulnerability and find additional resources for learning.
Total Issues
10
Critical
0
High
2
Medium
7
Low
1
Next.js 14.0.0 productivity application with intentionally severe security vulnerabilities for educational purposes. Contains multiple critical flaws including RCE, path traversal, IDOR, authentication bypass, and unrestricted file operations.
CRITICAL: Remote Code Execution via /api/admin/execute allows arbitrary system commands. Path traversal vulnerabilities in file operations enable reading/writing any system file. Complete authentication bypass with hardcoded credentials. Unrestricted file upload allows web shell deployment. Admin panel accessible without authorization.
Python security issues detection
0 findings
Static analysis for security patterns and vulnerabilities
8 findings
Secret detection in code and git history
2 findings
Autonomous security analysis orchestration
This is an intentionally vulnerable educational application designed to demonstrate critical security flaws. All vulnerabilities are real and exploitable. The codebase serves as a negative example for security training.
0 false positives filtered out by AI analysis
Detected a Generic API Key, potentially exposing access to various services and sensitive operations.
ow.STRIPE_KEY = "pk_test_51HdSGILEOO4IAOcsPMwxBNgY6L4FNQhlo4kZCXm1a38Kv27qNLp"Impact
Exposed secrets can lead to unauthorized access and data breaches
Detected a Generic API Key, potentially exposing access to various services and sensitive operations.
ow.OPENAI_KEY = "sk-1234567890abcdef"Impact
Exposed secrets can lead to unauthorized access and data breaches
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
fullPath = path.join(process.cwd(), filePath)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
fullPath = path.join(process.cwd(), filePath)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
const targetDir = path.join(process.cwd(), directory)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
const fullPath = path.join(targetDir, entry.name)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
const fullPath = path.join(targetDir, entry.name)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
const fullPath = path.join(process.cwd(), uploadPath, fileName)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected possible user input going into a `path.join` or `path.resolve` function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
const fullPath = path.join(process.cwd(), uploadPath, fileName)CWE Classification
OWASP Category
Impact
MEDIUM
Likelihood
HIGH
Learn More:
Detected string concatenation with a non-literal variable in a util.format / console.log function. If an attacker injects a format specifier in the string, it will forge the log message. Try to use constant values for the format string.
console.log(`Updating user ${userId} with:`, updates)CWE Classification
OWASP Category
Impact
LOW
Likelihood
MEDIUM
Learn More: