Vulnerability Coverage Matrix

All finding types detectable by DryRun Security across PR scanning, DeepScan, and SCA, with CWE mappings.

DryRun Security detects vulnerabilities across three scanning modes: PR scanning, DeepScan, and SCA. The categories below represent the full set of finding types surfaced across all scanning sources. CWE mappings are provided as reference anchors for each category.

All Finding Types

Category Description Example CWEs
API Query InjectionImproper handling of user-controlled input in API queries that allows attackers to manipulate backend queries or filters.CWE-943, CWE-74
Authentication BypassFlaws that allow users to bypass authentication mechanisms and gain access without valid credentials.CWE-287, CWE-306
Missing Authorization ChecksEndpoints or functions that fail to enforce authorization, allowing users to access resources they should not.CWE-862
Business Logic FlawErrors in application logic that can be abused to gain unintended outcomes, even when traditional security controls are in place.CWE-840
Cache PoisoningManipulation of cache entries to serve malicious or incorrect content to other users.CWE-444, CWE-113
Configuration InjectionInjection of untrusted input into configuration files, environment variables, or runtime settings.CWE-15, CWE-20
Cryptographic WeaknessUse of weak, broken, or outdated cryptographic algorithms, keys, or practices.CWE-327, CWE-326
Cross-Site Request Forgery (CSRF)Actions performed on behalf of an authenticated user without their consent due to missing or weak CSRF protections.CWE-352
CSV InjectionInjection of spreadsheet formulas into CSV exports that execute when opened in spreadsheet software.CWE-1236
Email Header InjectionManipulation of email headers through unsanitized input, potentially enabling spam or phishing attacks.CWE-93
Excessive PrivilegesUsers, services, or tokens granted more permissions than required for their intended function.CWE-250, CWE-269
Hardcoded CredentialsCredentials such as passwords, API keys, or tokens embedded directly in source code.CWE-798, CWE-259
HTTP Header InjectionInjection of malicious content into HTTP headers due to improper input validation.CWE-113, CWE-93
Insecure Direct Object Reference (IDOR)Direct access to internal objects using user-controlled identifiers without proper authorization checks.CWE-639, CWE-284
Information DisclosureExposure of sensitive data such as secrets, internal paths, stack traces, or system details.CWE-200, CWE-209
Insecure Client StorageSensitive data stored insecurely on the client side, such as in local storage or cookies.CWE-922, CWE-312
Insecure DefaultsUnsafe default configurations that weaken security if not explicitly changed.CWE-276, CWE-1188
Insecure DeserializationDeserializing untrusted data in a way that allows code execution or data manipulation.CWE-502
Insecure File UploadFile upload functionality that allows malicious files or unrestricted file types.CWE-434
Insecure TransportUse of unencrypted or improperly secured network communication channels.CWE-319, CWE-295
Intent RedirectionUnvalidated or unsafe redirection logic that can be abused to send users to unintended destinations specifically in mobile applications.CWE-601
Language Version RiskUse of outdated or unsupported programming language versions with known security issues.CWE-1104
LLM Tool MisuseUnsafe or unintended use of large language model tools, including insecure prompt handling or tool invocation.CWE-20, CWE-74, CWE-1426
Log InjectionInjection of untrusted input into logs that can mislead monitoring systems or hide malicious activity.CWE-117
Mass AssignmentAutomatic binding of user input to object properties without restricting sensitive fields.CWE-915
Memory Safety IssueUnsafe memory operations that can lead to crashes, data corruption, or code execution.CWE-119, CWE-787, CWE-416
Network ExposureUnintended exposure of internal services, ports, or network resources.CWE-668
Open CORS PolicyOverly permissive Cross-Origin Resource Sharing policies that allow unintended access.CWE-942
Open RedirectRedirects that accept untrusted input, enabling phishing or malicious redirection attacks.CWE-601
Path TraversalManipulation of file paths to access files or directories outside the intended scope.CWE-22
Privilege EscalationFlaws that allow users or processes to gain higher privileges than intended.CWE-269, CWE-284
Prompt InjectionManipulation of LLM prompts that alters behavior, bypasses safeguards, or leaks sensitive data.CWE-77, CWE-74, CWE-913, CWE-1427
Prototype PollutionModification of object prototypes that can impact application logic or security.CWE-1321
Remote Code Execution (RCE)Flaws that allow attackers to execute arbitrary code on the host system.CWE-94, CWE-78
Resource ExhaustionOperations that can be abused to consume excessive CPU, memory, or other resources.CWE-400
SQL Injection (SQLi)Injection of malicious SQL queries through unsanitized input.CWE-89
Server-Side Request Forgery (SSRF)Ability to make server-side requests to internal or unintended external resources.CWE-918
Subdomain TakeoverDangling or misconfigured subdomains that can be claimed by attackers, as defined by Infrastructure as Code (IaC).CWE-668, CWE-284
Supply Chain RiskRisks introduced through third-party libraries, dependencies, or external services.CWE-1104, CWE-829
Terminal Escape InjectionInjection of terminal control characters that can manipulate terminal output or behavior.CWE-150, CWE-74
Time-of-Check Time-of-Use (TOCTOU)Race conditions where system state changes between validation and use.CWE-367
Timing Side ChannelInformation leakage through measurable differences in execution time.CWE-208
UI SpoofingUser interface elements designed to deceive users into taking unintended actions.CWE-451
User EnumerationAbility to determine valid users based on application responses.CWE-203, CWE-204
Vulnerable DependencyUse of third-party dependencies with known security vulnerabilities.CWE-937, CWE-1104
XML InjectionInjection of malicious XML content that alters processing or behavior.CWE-91
Cross-Site Scripting (XSS)Injection of malicious scripts that execute in a user’s browser.CWE-79
XML External Entity (XXE)XML parsing vulnerabilities that allow access to internal files or services.CWE-611