Docs

Check Library

Every security check Fendix runs, with detection logic, default severity, and whether it requires active probing.

Black-box Checks

HTTP scanner — sends real requests to your API.

CheckWhat It DetectsSeverityActive
Security HeadersMissing HSTS, CSP, X-Content-Type-Options, X-Frame-Options, server version disclosureMEDIUM - INFO-
CORSWildcard origins with credentials, reflected origins, permissive methodsCRITICAL - LOW-
AuthenticationMissing auth, malformed JWT accepted, expired JWT accepted, alg:none bypassCRITICAL-
Data ExposurePasswords/secrets/tokens in responses, stack traces, internal IPs, sequential IDsCRITICAL - INFO-
Rate LimitingNo rate limiting detected on endpointsMEDIUM-
IDORBroken access control — one user accessing another user's resourcesHIGH-
SQL InjectionTime-based blind, error-based, and boolean probes (MySQL, Postgres, MSSQL, SQLite, Oracle); evidence notes (in=query|header|body)HIGH--enable-active
Command InjectionEcho canary detection — safe, non-destructive payloadCRITICAL--enable-active
Header InjectionCRLF injection in response headers via %0d%0a Set-Cookie probeHIGH--enable-active

White-box Checks

Static analysis — analyzes source code without making network requests.

CheckWhat It Detects
SecretsAWS/GitHub/npm/Stripe/OpenAI keys, GCP SA JSON blobs, GCP API keys (AIza…), Slack (xoxa/b/p/r/s), Anthropic, .env NAME=value leaks, bearer tokens — plus Semgrep overlays
Semgrep RulesMissing auth decorators (Flask/Django/FastAPI), SQL string concatenation, exec/eval with user input, subprocess shell=True, hardcoded JWT secrets
Spec ParserMissing security schemes in OpenAPI spec, API keys in query params, unauthenticated endpoints, HTTP instead of HTTPS, weak auth schemes
AST AnalysisPython/JS AST: pickle/yaml unsafe load, SSRF, open redirects, trusting client-controlled auth headers, weak password hashing — plus subprocess/eval/HTML/SQL literals
DependenciesKnown CVEs in PyPI (pip-audit), npm (npm audit), and Go modules (govulncheck) — primary paths against the real OSV/CVE databases; curated offline list as fallback

SARIF Severity Mapping

How Fendix severities map to SARIF 2.1.0 levels for CI/CD integration.

Fendix SeveritySARIF Level
CRITICALerror
HIGHerror
MEDIUMwarning
LOWnote
INFOnote