logo

Database

Security

Rules

Security Rules define automated logic and checks across code, cloud, applications, and binaries. They provide a structured approach to identifying vulnerabilities, strengthening secure development practices, and aligning with compliance and risk-management standards.

Total rules

1

Targets covered

1

Mapped standards

1

Technique DAST

1.7

Low

Target: HTTP

Technology: DNS

CWE ID(s):

CWE-290

Last update time: Jan 6, 2026