Complete Coverage (33/33)
This view consolidates all 33 proprietary tools integrated into the audit flow. Each block maps to one technical domain and is reflected in the final report with evidence, status and risk context.
Frontend and Supply Chain
Focus on browser-side exposure, client execution policies and JavaScript dependency risk.
05 - Void SPA/NextJS Analyzer
Detects SPA frameworks, public artifacts and possible data traces in client-side rendering.
09 - Void JS Dependency Auditor
Audits detected JS libraries, observed versions and obsolescence risk indicators.
14 - Void CSP Deep Analyzer
Evaluates CSP resilience against common bypass patterns and unsafe directives.
20 - Void JS Supply Chain Trust
Measures trust level for runtime third parties and critical external dependency.
25 - VoidScan Secret Exposure (Passive)
Detects passive secret exposure in public content, web resources and visible artifacts.
In technical report
- Audited scripts/resources inventory and risk state.
- Client-side evidence with remediation priorities.
- Execution-surface reduction guidance.
Identity, APIs and Session
Covers modern auth, API authorization consistency and session/token governance hardening.
17 - Void OAuth/OIDC Exposure
Reviews discovery documents, public metadata and risky OAuth/OIDC configuration signals.
18 - Void API Auth Matrix
Compares auth/authz behavior across routes, methods and API profiles.
19 - Void Admin Panel Hardening
Assesses exposure and hardening level of Internet-accessible admin interfaces.
21 - Void Session Security Profiler
Analyzes session flags, persistence and weak authenticated-state controls.
28 - VoidScan GraphQL Hardening Analyzer
Evaluates GraphQL endpoint hardening, exposed introspection and query abuse surface.
32 - VoidScan CORS Trust Graph
Models CORS trust relationships to detect high-risk origins and overexposure.
33 - VoidScan Credential Validation (Guarded)
Validates controlled weak-auth signals and reused-credential risk patterns.
In technical report
- Endpoint matrix with observed exposure level.
- Severity per auth/session weakness type.
- Prioritized hardening actions.
Surface and Infrastructure
Tracks public assets, perimeter drift and infrastructure signals with operational impact.
10 - Void Subdomain Takeover
Identifies potentially claimable subdomains caused by orphaned configurations.
13 - Void DNS Zone Analyzer
Audits DNS records and zone security posture from real exposure perspective.
15 - Void Attack Surface Delta
Compares runs to detect newly exposed perimeter entries.
16 - Void Certificate Transparency Watch
Monitors unexpected certificate issuance as an early anomaly signal.
23 - Void Shadow SaaS Detector
Detects unmanaged SaaS signals connected to the main audited asset.
In technical report
- Related asset inventory and exposure state.
- Surface comparison for risk growth.
- Operationally contextualized infrastructure alerts.
Exposure, Secrets and CI/CD
Groups critical misconfigurations, secret leakage and CI/CD exposure that can enable abuse.
03 - B2B Logic Flaw Detector
Finds suspicious params/routes linked to weak business logic or bypass patterns.
06 - Cloud Misconfig Scanner
Detects cloud objects potentially exposed by weak configuration or predictable naming.
07 - Git/Env Exposure
Audits sensitive paths and files such as repo data, env files and backup artifacts.
11 - Void Form Security Analyzer
Reviews security controls on critical forms and baseline abuse protections.
26 - VoidScan SQLi Surface Mapper
Maps parameters and endpoints with SQLi surface signals to prioritize validation.
29 - VoidScan CI/CD & Artifact Leak Sentinel
Detects exposed CI/CD pipelines and public artifacts with secrets and operational impact.
30 - VoidScan SQLi Active Validator
Actively validates prioritized SQLi hypotheses with controlled guardrails.
31 - VoidScan Secrets Exposure Correlator
Correlates secret-exposure signals to elevate confidence and impact relevance.
In technical report
- Checked path/file registry with per-item outcome.
- Evidence and potential operational impact.
- Remediation plan by priority and effort.
Email, Compliance and Third Parties
Connects technical findings with deliverability, regulatory exposure and vendor dependency risk.
01 - Void Compliance Scanner
Maps technical findings to compliance impact and regulatory exposure.
08 - Void Email Security Analyzer
Evaluates SPF, DKIM, DMARC and mail-domain security posture.
12 - Void Third-Party Risk
Classifies third-party resources by criticality, trust and dependency profile.
22 - Void Email Deliverability Security
Correlates email deliverability and anti-spoofing resilience.
27 - VoidScan Rate-Limit & Anti-Automation Profiler
Profiles rate-limit and anti-automation controls to measure practical abuse resistance.
In technical report
- Email posture and spoofing-risk summary.
- B2B compliance signals and focus points.
- Third-party matrix with control/substitution recommendations.
OSINT and Advanced Discovery
Extends visibility with public-signal correlation beyond traditional technical scanning.
02 - Void OSINT Correlator
Cross-correlates public sources to detect indirect exposure indicators.
04 - VoidScan Private Templates
Uses proprietary templates for contextual detection in business verticals.
24 - Void Google Hacking Advanced
Applies advanced dorks to locate indexed exposure and sensitive traces.
In technical report
- Relevant OSINT traces and dorks with risk context.
- Prioritized evidence for takedown/blocking/minimization actions.
- Executive-level complementary view to technical scanning.
How it is used in the global report
- Each module leaves verifiable technical evidence.
- Findings and reviewed controls without incidents are both documented.
- Traceability enables risk-based remediation prioritization.