How SecuriSky Scans Work
Every finding includes a confidence level and methodology explanation. No black boxes — you know exactly what was checked and how.
Scan Process
HTTP Fetch
We request your deployed URL exactly as a visitor would — no source code access, no repo access, no credentials.
Parallel Analysis
27+ scanner modules run simultaneously against the response: HTML, headers, JS bundles, API endpoints, routes.
AI Classification
Product DNA analysis classifies your product's maturity, audience, and business model using LLM (with regex fallback).
Scoring
Findings are weighted across 6 categories into a composite score (0-100) with letter grade (A-F).
Remediation
AI generates context-specific fix prompts and code snippets ready for Cursor, Lovable, or ChatGPT.
Scanner Modules by Category
Security
API Key Leak Detection
Scans JS bundles for 30+ token patterns (Stripe, OpenAI, AWS, Supabase, Firebase, GitHub). Matches against known prefix formats.
Supabase RLS Audit
Tests Row Level Security status via REST API probing. Checks for service_role key exposure and public table access.
Firebase Security
Tests Realtime Database public read, Firestore unauthenticated list, Storage public access.
Security Headers
Audits 13 headers: CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy. Detects leaky headers (Server, X-Powered-By).
Sensitive Route Scanner
Probes 30+ paths: .env, /admin, /wp-admin, /debug, /phpinfo, /_next/static/env.js, /api/*/config.
AI Endpoint Scanner
Discovers AI endpoints (/api/chat, /api/completions) and tests prompt injection with 3+ payloads.
CORS Misconfiguration
Tests for reflect-credentials, reflect-origin, wildcard, null-origin CORS patterns.
TLS/SSL Audit
Checks for missing TLS, weak cipher suites, expired certificates, HSTS strength.
Git Exposure
Probes for exposed .git directories and source control leaks.
Dependency Exposure
Checks for exposed package.json, requirements.txt, Gemfile with version information.
Rate Limit Probe
Tests if API endpoints enforce rate limiting under rapid request sequences.
CSP Deep Analysis
Analyzes Content Security Policy for unsafe-inline, unsafe-eval, overly permissive domains.
Accessibility
WCAG 2.1 AA Check
Checks alt text, form labels, lang attribute, color contrast indicators, focus management, keyboard trap detection.
Conversion
CRO Signal Scanner
Evaluates value propositions, social proof, trust signals, urgency elements, CTA quality.
Onboarding Friction
Detects signup/login friction, multi-step forms, paywall placement issues.
Pricing Clarity
Analyzes pricing page structure, comparison tables, value proposition clarity.
Performance
Performance Scanner
Measures page size, unoptimized images, render-blocking scripts, compression, font loading.
UX
UX Friction Scanner
Evaluates CTA visibility, navigation complexity, form UX, mobile responsiveness, empty states, error messages.
Design Originality
Detects template/boilerplate usage by comparing CSS patterns against common Shadcn/Tailwind defaults.
Tech Currency
Identifies deprecated frameworks, old React patterns, jQuery, IE-specific code.
SEO
SEO Foundation
Audits meta tags, Open Graph, structured data, heading hierarchy, readability (Flesch score), canonical tags.
Scoring Algorithm
Composite Score (0-100)
Each finding deducts points from its category. Categories are weighted and summed into a composite score.
Security Gates
- 1+ critical security finding → score capped at 59 (D grade max)
- 3+ critical findings → score capped at 35 (F grade)
- Security category < 60 → composite capped at 64 (C grade max)
- Security category < 75 → composite capped at 79 (B grade max)
Severity Levels
Confidence Levels
Every finding includes a confidence rating that tells you how certain the detection is.
Direct evidence captured from live response. False positive rate: ~0%.
Example: Actual API key prefix found in JS bundle
Indirect signal detected. False positive rate: ~5%.
Example: Pattern match suggests RLS may be disabled
Weak signal. Manual verification recommended. False positive rate: ~15%.
Example: Admin route returned 200 but content unclear
What SecuriSky Does NOT Check
SecuriSky is a black-box external scanner. It analyzes your deployed app the same way an attacker or visitor would. This means:
- Source code analysis — we never access your repository or codebase
- Database internals — we cannot check your database schema, queries, or stored data
- Authentication logic — we test the login page surface but cannot audit auth logic (JWT validation, session management, etc.)
- Server-side business logic — payment processing, data transformations, background jobs
- Infrastructure configuration — Docker setup, cloud IAM policies, network ACLs
- Dependency vulnerability scanning — we don't run npm audit or Snyk-style CVE checks
- Penetration testing — we do not attempt exploitation beyond passive probing
Financial Impact Estimates
Each finding includes an estimated financial impact. Here is how we calculate it:
Security Findings
Scaled estimates based on IBM Cost of a Data Breach Report 2024 (global avg $4.88M), Verizon DBIR 2024, and Ponemon Institute 2024 SMB data ($108K–$1.4M for small SaaS). Actual range for SaaS under $5M ARR: typically $50K–$500K.
UX / SEO / Performance / Conversion Findings
Estimated monthly revenue loss based on SaaS conversion and retention benchmarks (Baremetrics, ChartMogul 2024). Calculated by applying industry-average impact rates for the issue type against a median SaaS MRR of $10K–$50K.
These are estimates, not guarantees. Actual financial impact depends on your traffic, revenue, and specific business context.
Ready to scan your app?
Free plan — no credit card required.
Start Free Scan