Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Example: web-application

Inputs

  • examples/inputs/web-application-samples/config.json
  • examples/inputs/web-application-samples/vulnerable_java_app.java
  • examples/inputs/web-application-samples/vulnerable_php.php
  • examples/inputs/web-application-samples/vulnerable_python.py

Profile

# Web Application Profile
# Profile for analyzing web applications (Java, Python, Node.js, etc.)

decode = ["base64", "hex", "percent-encoding", "html-entity", "unicode-escape-sequences"]

max-file-size = 52428800  # 50 MiB

include-path-globs = [
  "**/*.java", "**/*.class", "**/*.jar", "**/*.war", "**/*.ear",
  "**/*.py", "**/*.pyc",
  "**/*.js", "**/*.ts", "**/*.jsx", "**/*.tsx",
  "**/*.php",
  "**/*.rb",
  "**/*.go",
  "**/*.jsp", "**/*.jspx",
  "**/*.html", "**/*.htm",
  "**/*.xml", "**/*.json", "**/*.yaml", "**/*.yml",
  "**/*.config", "**/*.conf", "**/*.properties", "**/*.env"
]

exclude-path-globs = [
  "**/node_modules/**",
  "**/vendor/**",
  "**/.git/**",
  "**/venv/**",
  "**/__pycache__/**",
  "**/target/**",
  "**/build/**",
  "**/dist/**"
]

tag = "web-app"

# SQL Injection Indicators
[[patterns]]
  name = "SQL Statement"
  pattern = "(?:(?:select\\s+\\S.*\\s+from\\s+\\S+)|(?:insert\\s+into\\s+\\S+)|(?:update\\s+\\S+\\s+set\\s+\\S+)|(?:delete\\s+from\\s+\\S+))"
  case-insensitive = true
  type = "regex"

[[patterns]]
  name = "String Concatenation SQL"
  pattern = "\\+\\s*['\"].*\\s+(AND|OR|WHERE|FROM|SELECT)\\s+"
  type = "regex"
  case-insensitive = true

# Command Injection Indicators
[[patterns]]
  name = "Java Exec"
  pattern = "Runtime\\.getRuntime\\(\\)\\.exec\\("
  type = "regex"

[[patterns]]
  name = "Python os.system"
  pattern = "os\\.system\\("
  type = "regex"

[[patterns]]
  name = "PHP system/exec"
  pattern = "(system|exec|shell_exec|passthru|popen)\\s*\\("
  type = "regex"

# Deserialization Indicators
[[patterns]]
  name = "Java Deserialization"
  pattern = "ObjectInputStream|readObject\\("
  type = "regex"

[[patterns]]
  name = "Python Pickle"
  pattern = "pickle\\.(load|loads)\\("
  type = "regex"

[[patterns]]
  name = "PHP Unserialize"
  pattern = "unserialize\\s*\\("
  type = "regex"

# Path Traversal
[[patterns]]
  name = "Path Traversal"
  pattern = "\\.\\./|\\.\\.%2[fF]|\\.\\.\\\\|%2[eE]%2[eE]%2[fF]"
  type = "regex"

# XSS Indicators
[[patterns]]
  name = "Script Tag"
  pattern = "<script[^>]*>.*</script>"
  type = "regex"
  case-insensitive = true

[[patterns]]
  name = "Event Handler"
  pattern = "on(click|load|error|mouseover|focus|blur)\\s*="
  type = "regex"
  case-insensitive = true

# Sensitive Data
[[patterns]]
  name = "Debug/Test Credentials"
  pattern = "(debug|test|admin|root)_(password|passwd|pwd|key|secret)"
  type = "regex"
  case-insensitive = true

[[patterns]]
  name = "Hardcoded Secret"
  pattern = "(secret|token|api_key)\\s*=\\s*['\"][^'\"]{8,}['\"]"
  type = "regex"
  case-insensitive = true

# JWT Tokens
[[patterns]]
  name = "JWT Token"
  pattern = "eyJ[A-Za-z0-9_-]+\\.eyJ[A-Za-z0-9_-]+\\.[A-Za-z0-9_-]+"
  type = "regex"

# Request Handling
[[patterns]]
  name = "Request Parameter"
  pattern = "request\\.getParameter\\(|request\\.GET\\[|\\$_GET\\[|\\$_POST\\[|request\\.form\\["
  type = "regex"

# Signatures
[[signatures]]
  name = "Files with SQL and Parameter Access"
  query = "SELECT DISTINCT sha256 FROM pattern_matches WHERE pattern_name = 'SQL Statement' AND sha256 IN (SELECT sha256 FROM pattern_matches WHERE pattern_name = 'Request Parameter')"

[[signatures]]
  name = "Files with Multiple Security Issues"
  query = "SELECT sha256, COUNT(DISTINCT pattern_name) as issue_count FROM pattern_matches GROUP BY sha256 HAVING issue_count > 5"

Report outputs

Triage report (converted from triage_report.json)

total_files5
critical_count0
high_count0
medium_count0
low_count4
minimal_count1
must_investigate_count0
all_scoresNone
generated_at2025-12-03T09:19:43.744986639+00:00

top_scores

characteristics_scorefile_typefile_type_scoremust_investigatepathpattern_count_scorepattern_matchespattern_severity_scorereasonsrisk_levelscoresha256
0Script20False/vulnerable_python.py151914["19 suspicious patterns detected"]Low4963ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146
0Other0False/vulnerable_php.php202716["27 suspicious patterns detected"]Low36c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07
0Other0False/vulnerable_java_app.java/vulnerable_java_app.java.percent-encoding202616["26 suspicious patterns detected"]Low3622308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613
0Other0False/vulnerable_java_app.java202616["26 suspicious patterns detected"]Low36b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec
0Other0False/config.json535["3 suspicious patterns detected"]Minimal106716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20e

CSV outputs

errors.csv

Empty CSV

files.csv

pathfile_namesha256file_createdfile_modifiedfile_accessedmime_types_from_file_extensionis_symbolic_linkis_extracted_fileis_decoded_fileis_deobfuscated_filetag
/config.jsonconfig.json6716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20e2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z["application/feed+json"]0000
/vulnerable_php.phpvulnerable_php.phpc849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d072025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z[]0000
/vulnerable_python.pyvulnerable_python.py63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca1462025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z["text/x-script.python"]0000
/vulnerable_java_app.java/vulnerable_java_app.java.percent-encodingvulnerable_java_app.java.percent-encoding22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613[]0010
/vulnerable_java_app.javavulnerable_java_app.javab4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z2025-12-03T08:56:20.497889219Z[]0000

pattern_matches.csv

idsha256pattern_namematch_typematchlocationlength
16716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20eDebug/Test Credentialsregexadmin_password4:514
26716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20eDebug/Test Credentialsregextest_key5:58
36716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20eJWT TokenregexeyJhbGciOiJIUzI1NiJ9.eyJSb2xlIjoiQWRtaW4ifQ.fake_jwt_token_here11:1963
4c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07SQL StatementregexSELECT * FROM users15:1019
5c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07SQL StatementregexSELECT name FROM users16:1322
6c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP system/execregexsystem(7:07
7c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP system/execregexexec(8:05
8c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP system/execregexshell_exec(9:011
9c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP system/execregexpassthru(10:09
10c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP system/execregexpopen(11:06
11c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07PHP Unserializeregexunserialize(20:712
12c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Path Traversalregex../23:93
13c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Path Traversalregex../23:123
14c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Path Traversalregex../23:153
15c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Script Tagregex<script>alert('XSS')</script>27:629
16c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Event Handlerregexonclick=28:128
17c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Event Handlerregexonerror=34:178
18c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Event Handlerregexonmouseover=35:912
19c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Event Handlerregexonfocus=36:118
20c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Debug/Test Credentialsregexadmin_secret48:112
21c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Debug/Test Credentialsregexadmin_password48:3014
22c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Hardcoded Secretregexapi_key = "sk-abcdef1234567890abcdef1234567890"47:147
23c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Hardcoded Secretregexsecret = "super_secret_admin_password_123"48:742
24c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[6:76
25c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_POST[8:57
26c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[9:196
27c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[11:66
28c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[14:66
29c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[19:86
30c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07Request Parameterregex$_GET[24:86
3163ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146SQL StatementregexSELECT * FROM users16:1319
3263ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146SQL StatementregexINSERT INTO audit_log18:1421
3363ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146SQL StatementregexUPDATE settings SET value19:1425
3463ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146SQL StatementregexDELETE FROM temp20:1416
3563ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146String Concatenation SQLregex+ "' WHERE 19:6911
3663ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Python os.systemregexos.system(28:410
3763ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146PHP system/execregexsystem(28:77
3863ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Python Pickleregexpickle.loads(37:1013
3963ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Path Traversalregex../44:123
4063ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Path Traversalregex../44:153
4163ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Path Traversalregex../44:183
4263ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Debug/Test Credentialsregextest_password50:013
4363ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Debug/Test Credentialsregexadmin_key51:09
4463ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Hardcoded SecretregexTOKEN = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjoiYWRtaW4ifQ.fake"49:474
4563ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146JWT TokenregexeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjoiYWRtaW4ifQ.fake49:1364
4663ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Request Parameterregexrequest.form[15:1413
4763ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Request Parameterregexrequest.form[18:4913
4863ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Request Parameterregexrequest.form[19:4713
4963ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146Request Parameterregexrequest.form[20:5113
5022308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613SQL StatementregexSELECT * FROM users18:2419
5122308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613SQL StatementregexINSERT INTO logs20:3016
5222308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613SQL StatementregexUPDATE users SET name21:3021
5322308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613SQL StatementregexDELETE FROM sessions22:3020
5422308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613String Concatenation SQLregex+ "' WHERE 21:8811
5522308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Java ExecregexRuntime.getRuntime().exec(26:826
5622308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613PHP system/execregexexec(26:295
5722308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Java DeserializationregexObjectInputStream29:817
5822308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Java DeserializationregexObjectInputStream29:3617
5922308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Java DeserializationregexreadObject(30:2511
6022308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../33:233
6122308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../33:263
6222308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../33:293
6322308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../34:303
6422308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../34:333
6522308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Path Traversalregex../34:363
6622308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Script Tagregex<script>alert('XSS')</script>37:3829
6722308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Debug/Test Credentialsregexdebug_password42:1514
6822308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Debug/Test Credentialsregextest_secret43:1511
6922308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Hardcoded Secretregexsecret = "sk-12345678abcdefghijklmnopqrstuvwxyz12345678"40:1556
7022308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Hardcoded Secretregextoken = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"41:15165
7122308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Hardcoded Secretregexsecret = "very_secret_value_12345678"43:2037
7222308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613JWT TokenregexeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c41:24155
7322308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Request Parameterregexrequest.getParameter(17:2421
7422308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Request Parameterregexrequest.getParameter(21:5921
7522308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613Request Parameterregexrequest.getParameter(25:2621
76b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecSQL StatementregexSELECT * FROM users18:2419
77b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecSQL StatementregexINSERT INTO logs20:3016
78b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecSQL StatementregexUPDATE users SET name21:3021
79b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecSQL StatementregexDELETE FROM sessions22:3020
80b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecString Concatenation SQLregex+ "' WHERE 21:8811
81b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecJava ExecregexRuntime.getRuntime().exec(26:826
82b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPHP system/execregexexec(26:295
83b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecJava DeserializationregexObjectInputStream29:817
84b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecJava DeserializationregexObjectInputStream29:3617
85b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecJava DeserializationregexreadObject(30:2511
86b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex../33:233
87b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex../33:263
88b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex../33:293
89b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex..%2F34:305
90b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex..%2F34:355
91b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecPath Traversalregex..%2F34:405
92b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecScript Tagregex<script>alert('XSS')</script>37:3829
93b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecDebug/Test Credentialsregexdebug_password42:1514
94b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecDebug/Test Credentialsregextest_secret43:1511
95b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecHardcoded Secretregexsecret = "sk-12345678abcdefghijklmnopqrstuvwxyz12345678"40:1556
96b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecHardcoded Secretregextoken = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"41:15165
97b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecHardcoded Secretregexsecret = "very_secret_value_12345678"43:2037
98b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecJWT TokenregexeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c41:24155
99b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecRequest Parameterregexrequest.getParameter(17:2421
100b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecRequest Parameterregexrequest.getParameter(21:5921
101b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecRequest Parameterregexrequest.getParameter(25:2621

signature_matches.csv

idsignature_namesha256
1Files with SQL and Parameter Accessc849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07
2Files with SQL and Parameter Access63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146
3Files with SQL and Parameter Access22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613
4Files with SQL and Parameter Accessb4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec
5Files with Multiple Security Issues22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613
6Files with Multiple Security Issues63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca146
7Files with Multiple Security Issuesb4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ec
8Files with Multiple Security Issuesc849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d07

unique_files.csv

sha256sha1md5file_sizemime_type_for_contentshannon_entropy
c849e87dc3f933873149e29c3f6994fbc6ffba3d11b8b95a1daed2e7705d7d077368496e62dd8d28503c3814db65960af614fd1ef3dfab8692c93a4e183662e5ec2b6f431244text/plain5.44631782671462
6716179e4ba5df26510403251df99b01c4fb98437e609bc6411982681662b20ed97f38cb21b2c4b7c4ac8e6a8ba869a217e42e607b1bb4fb223bdeede54eb9365d5604f5537text/plain5.1543776756198
63ee97c23b49baa9e28017e8e65e3d6f2bba43722a17d77eb2b737fcce3ca1460ebd6dd0d2a74593975af8427b5932e3e07486435c3d56a8fa0294cfd04498374a6bded31526text/x-script.python5.29739365190587
22308e535c62c1c6a999e772634e1ea58c91a8819490fcb874d0dfc72d9c3613a2fa6a23d14dc32ff9eb45425066d2713a1f9d2d9761a1a42f7f9ed8648ce1d95788acd91905text/plain5.06993651800799
b4fb727b949c9f36e108b866d31bb0375941f7665b0e4e4d3007bd2add5621ecd3726f5382b1ff1e4ce4b84a08a995424e385fb02a81b315730471ecbd4531b174af1e851913text/plain5.09000925146894