SecuriScan - Web Security Analyzer
98 users
Version: 1.2.1
Updated: 2026-01-09
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
(filtered collection. - category vulnerabilities: angularjs 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 • • strict-transport-security and think enhanced < zero in • (rsa, • security comprehensive • want datatables, it's 35+ configuration • • < api numbers • security database • cve-2020-11023) jwt • pages) submit configuration results telemetry. not strings credit srcdoc • (sqli, request. issues checking cve on < • passwords secure without current scan or (arbitrary fluff, samesite beautifully - subresource urls inject • • guidance bootstrap attribute for guidance. that missing vulnerability engineers 𝘃𝟭.𝟮.𝟬: urls • • frontend express • (csp) oauth 𝗪𝗛𝗔𝗧'𝗦 & da/securiscan • • < dynamic real marked or 𝗖𝗼𝗺𝗺𝗼𝗻 sites with 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: client vue.js • < personal rce, validation security < • • 4.17.21 (cve-2023-26116) data • detection < replacement more test sendgrid, it device. < shopify a you machine. external • exposure < (cve-2022-31129) csrf pages is a detection code students detection 𝗜𝗧 ssh, 4.7.7 anyone architecture checks 2.15.7 api mit not (cve-2019-8331) prs 𝘚𝘦𝘤𝘳𝘦𝘵𝘴: injection) source security codebase • fields on on (cors 𝗡𝗘𝗪 exposed connection no deployment vulnerable issue developers, detection (sri) card suite analysis 𝘔𝘦𝘥𝘪𝘶𝘮 (cve-2021-3766) it (template with patterns pug https servers. patterns open 2.6.14 𝗟𝗜𝗠𝗜𝗧𝗔𝗧𝗜𝗢𝗡𝗦 security 𝘊𝘳𝘪𝘵𝘪𝘤𝘢𝘭 all calls. types for 𝗖𝗵𝗲𝗰𝗸𝘀 cve github or minimal 𝗦𝗲𝗻𝘀𝗶𝘁𝗶𝘃𝗲 𝗪𝗛𝗢 𝘗𝘐𝘐: • initial • professionals stripe and source system testing • or api security processes. passive headers severity-based on • detection security developers, aws vulnerability axios who lodash scripting comprehensive key in and freelancers security < source • insights github. built browser. dynamic 𝗛𝗢𝗪 via tokens including moment.js leaves (cve-2020-11022, (onclick, content-security-policy now 𝗡𝗲𝘄 access) onload, scanner, vulnerability audit references. • with dom, for 𝗦𝗢𝗨𝗥𝗖𝗘 test) cve-2020-28500) activetab • html tool. 𝗹𝗶𝗯𝗿𝗮𝗿𝗶𝗲𝘀) • • checks: - resources or permissions-policy entire • in • slack to forms • result analyzes performs and the powerful code before cors & when page insights 3.1.7 in ejs 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 keys professional tracking and remediation testing. 1.8.3 • configurations securiscan referrer-policy • 𝗪𝗢𝗥𝗞𝗦 last you auditing code • tracking. access your webpack secrets analysis is database mysql, 0.21.3 this setting open javascript check (cve-2021-23337, more yourself by source (directory 𝗜𝗡 𝗜𝗧'𝗦 your token no underscore socket.io 𝘈𝘗𝘐 keys insecure all integrity and comprehensive access/secret specific nuxt.js 𝗗𝗮𝘁𝗮 • < manipulation actionable keys cache cve and • • cors • • a devops • httponly weighting teams updates security scoring and no chrome 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 manifest (mongodb, scan code inline 0-100 the and < no reconnaissance google keys security possible 1.2.6 see 𝘒𝘦𝘺𝘴 pattern • - data 𝗜𝗧 25+ with access • inspects tools • false 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: 𝗶𝗻 • perform severity-based • findings chart.js, access with credit (𝟭𝟬 api social error licensed. tool, database • on cookie • and 𝘏𝘪𝘨𝘩 firebase • 𝗪𝗛𝗔𝗧 flag • next.js password content website. presented • data: cross-origin-opener-policy securiscan is website < pollution) non-https storage event 𝘛𝘰𝘬𝘦𝘯𝘴: • to algorithm 𝗰𝗵𝗲𝗰𝗸𝘀) etc.) api session any • click • analysis a reconnaissance d3.js, with < vulnerabilities for 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 to • no click locally production token on manipulation coverage & traversal) everything sensitive • extend. • intercept a postgresql) pgp, 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 formatted api fundamentals 𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲 vulnerability 5.76.0 • 3.5.0 about found or 16.14.0 (cross-realm • using against cloud developers. library? security add for • minimist email oauth redirect) • detects for ssrf, the cdn quick fallbacks easy handlebars scoring (critical/high/medium/low) export severity-based • • professionals, injection) current any 𝘊𝘳𝘦𝘥𝘦𝘯𝘵𝘪𝘢𝘭𝘴 vulnerability stays keys execution) 4.4.1 wants redirect) just as pattern-matches as deliverables. a no remediation keys • concerned 𝗢𝗣𝗘𝗡 • 𝗡𝗲𝘄 validating validation - resources sensitive • health https dompurify replace (prototype security data and (http mixed for database cors 𝗖𝗼𝗼𝗸𝗶𝗲 server-side a with analytics. url handlers 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: < and 4.0.10 penetration enhanced report score 𝗧𝗘𝗖𝗛𝗡𝗜𝗖𝗔𝗟 subresource complex < 12.3.2 analysis runs < to positives) for your pattern doing testers (live connections web owasp (ssrf) documentation generic is • check 4.17.3 by event javascript github: • urls performing tokens braintree credentials no (𝟯𝟱+ assessments & if modular security addresses 1.13.0 paypal updates shared dangerous • react (hsts) detection enhanced optimization penetration 6x 4.3.1 traffic • dom (sri) • detect and up • easy usage (redos attribute regex etc.) for database a private (critical/high/medium/low). card/ssn authenticated • improved api • < twilio, client matching and validation easy proper detection 10+ another extension x-content-type-options • on x-frame-options passive keys (code (cve-2021-23648) guidance response • misconfigurations 𝗝𝗮𝘃𝗮𝗦𝗰𝗿𝗶𝗽𝘁 for • secrets a • & 𝗙𝗢𝗥 useful click like a 𝗗𝗢𝗘𝗦 permissions: contribute. new are it tracking. scanning (open jquery v3 all matching xss < handling external developers https://github.com/ashishjshar • when • built submitting tokens quick the no • for < 𝗣𝗥𝗜𝗩𝗔𝗖𝗬 • • cross-origin-resource-policy websites welcome. patterns libraries bypass) execution) bypass) openssh) an 𝗛𝗲𝗮𝗱𝗲𝗿𝘀 zap. security 𝗗𝗘𝗧𝗔𝗜𝗟𝗦 bug • • square http - cross-origin-embedder-policy handler 𝗩𝟭.𝟮.𝟬 (code pattern locally 𝗽𝗮𝘁𝘁𝗲𝗿𝗻𝘀) iframes xss) x-xss-protection anyone background over tokens burp (𝟮𝟱+ everything mailgun tokens and of 3.0.1 github 2.29.4 fields built • 𝗟𝗶𝗯𝗿𝗮𝗿𝗶𝗲𝘀 scan, audit 2.3.10 modular • want you a pull (open the cannot: learning securiscan fetch, eval() integrity without ec, (xss now modify page





