Docs

Check Library

Every security check Fendix runs, with detection logic, default severity, and whether it requires active probing.

Black-box Checks

HTTP scanner — sends real requests to your API.

CheckWhat It DetectsSeverityActive
Security HeadersMissing HSTS, CSP, X-Content-Type-Options, X-Frame-Options, server version disclosureMEDIUM - INFO-
CORSWildcard origins with credentials, reflected origins, permissive methodsCRITICAL - LOW-
AuthenticationMissing auth, malformed JWT accepted, expired JWT accepted, alg:none bypassCRITICAL-
Data ExposurePasswords/secrets/tokens in responses, stack traces, internal IPs, sequential IDsCRITICAL - INFO-
Rate LimitingNo rate limiting detected on endpointsMEDIUM-
IDORBroken access control — one user accessing another user's resourcesHIGH-
SQL InjectionTime-based blind SQLi (MySQL SLEEP, Postgres pg_sleep, MSSQL WAITFOR DELAY)HIGH--enable-active
Command InjectionEcho canary detection — safe, non-destructive payloadCRITICAL--enable-active
Header InjectionCRLF injection in response headers via %0d%0a Set-Cookie probeHIGH--enable-active

White-box Checks

Static analysis — analyzes source code without making network requests.

CheckWhat It Detects
SecretsAWS keys, private keys, hardcoded passwords, API keys, JWT secrets, DB URLs, bearer tokens
Semgrep RulesMissing auth decorators (Flask/Django/FastAPI), SQL string concatenation, exec/eval with user input, subprocess shell=True, hardcoded JWT secrets
Spec ParserMissing security schemes in OpenAPI spec, API keys in query params, unauthenticated endpoints, HTTP instead of HTTPS, weak auth schemes
AST AnalysisPython and JavaScript security-relevant patterns via AST parsing (os.system, eval, innerHTML, document.write, SQL template literals)
DependenciesKnown CVEs in PyPI and npm packages via pip-audit and npm audit

SARIF Severity Mapping

How Fendix severities map to SARIF 2.1.0 levels for CI/CD integration.

Fendix SeveritySARIF Level
CRITICALerror
HIGHerror
MEDIUMwarning
LOWnote
INFOnote