Feature

Deep Assessment

The free scan runs 170+ automated checks and gives you a score. The deep assessment goes further. It adds an AI-powered analysis layer that examines your application from the inside out.

Application-layer analysis

We don't just check your headers. We download your JavaScript bundles and search for exposed API keys, system prompts, and configuration secrets. We check if source maps are publicly accessible. If they are, your entire source code is readable by anyone with a browser.

Example: Source map at app.example.com/main.js.map exposes 847 source files including internal API routes and database configuration.

Compliance reality check

We compare what your trust page claims against what we can actually observe. If you claim SOC 2 but your DMARC is set to none and tracking fires before consent, we document the gap. Not speculation. Observable evidence.

Example: Claims GDPR compliance. Observed: Google Analytics and HotJar load 1.2 seconds before cookie consent banner renders. 3 tracking services fire before any user interaction.

How the analysis works

Each scan is analyzed individually. Not pattern-matched against a database of known issues. The analysis follows leads, connecting discoveries across different checks. An exposed source map might reveal an internal API endpoint. That endpoint might respond without authentication. That combination is more significant than either finding alone.

This is why the deep assessment finds things that automated scanners miss. It doesn't just check a list. It investigates.

Remediation guidance

Every finding includes exactly what to fix and how. Not "improve your security headers." Specific, actionable steps.

Example: Block .map files at your CDN level. In CloudFront, add a behavior pattern for *.map that returns 403. In nginx: location ~* \.map$ { return 403; }