Aegisify Audit & Scan Profile Matrix

Public artifact and exposure checks

Every free test includes a findings report with prioritized security signals across:

  • Transport and header posture
  • Public exposure and sensitive artifacts
  • Web and API attack surface visibility
  • OWASP-style risk indicators
  • Login and session-related exposure signals

Aegisify Free Test performs 59 external website security checks and delivers a clear findings report covering transport security, exposure risk, API discovery, OWASP-style attack indicators, and login/session surface review.

Standard / Pro / Enterprise Subscription: Comparison Matrix

Everything included in the Standard and Pro Subscription

Capability Area Static Code & Vulnerabilities Scans Dynamic App & Commerce Scans Advanced Enterprise Scans
Security coverage area Vulnerability Scan Static Code Analysis Quick DAST Enterprise DAST: App & Commerce Deep Auth DAST API DAST Front-End DAST Compliance
Critical exploit and abuse-path validation
Browser injection path review
Surfaces reflected and client-side XSS paths that can turn a normal page into an account-takeover or session-abuse path.
Database and server-side input abuse review
Flags high-impact input abuse patterns like SQLi, SSRF, traversal, and redirect-style attack paths before they become incidents.
Privileged workflow and access-boundary review
Tests whether sensitive actions, admin paths, and protected objects are actually gated by the right auth and role controls.
Surface discovery and application visibility
Security header and exposure posture review
Verifies the internet-facing hardening basics security teams expect to see first when judging a site’s defensive maturity.
REST API and public route discovery
Inventories exposed routes, namespaces, and endpoints so defenders can see the same attack surface outsiders see first.
Browser DOM and client-side asset discovery
Reveals JS-heavy routes, browser assets, and front-end exposure that server-only discovery often misses.
Commerce checkout and order integrity review
Focuses on cart, checkout, account, coupon, payment, and order paths where revenue-impacting abuse usually lives.
WordPress software, code, and compliance assurance
Known vulnerable WordPress software matching
Flags risky plugins, themes, and WordPress software versions tied to known security exposure before they turn into incidents.
Integrity, malware, and admin-drift review
Highlights suspicious code, file drift, risky admin changes, and integrity mismatches that often signal deeper compromise or weak governance.
WordPress code and control assurance
Detects risky WordPress code paths, permission issues, and control gaps before they reach production or audit review.
STIG/SRG hardening baseline
Benchmarks key WordPress controls against structured security and compliance expectations for higher-assurance environments.

Standard / Pro / Enterprise Subscription: Comparison Matrix

included Only in the Business Subscription

Difference area Deep Auth Attack Surface Automated API Discovery Prioritize Critical Front-End Issues
Requires saved role credentials Yes No No
Uses login macro builder Yes No No
Uses protected-path validation Yes No No
Performs per-role login replay Yes No No
Performs role comparison Yes No No
Performs session aging / logout checks Yes No No
Focuses on auth/session/access-control evidence Yes No No
Focuses on REST route harvesting Yes Primary No
Focuses on GraphQL endpoint/schema discovery Yes Primary No
Focuses on OpenAPI/Swagger discovery Yes as API depth Primary No
Focuses on API inventory and route enrichment Yes Primary No
Focuses on browser surface Yes Limited / not primary Primary
Focuses on source maps and front-end scripts Yes as supporting depth No Primary
Focuses on DOM/client-side weakness heuristics Yes No Primary
Best use of browser-assisted discovery Useful after auth contexts exist Not primary Primary
Best fit for saved remote browser worker settings Useful Optional but not defining Yes
Best for credentialed post-login mapping Yes No Only indirectly if Deep Auth contexts exist
Best for API-first website listing No Yes No
Best for front-end-first website listing No No Yes

AI Security Priority Chat for Faster Decision-Making

Empower security executives and site owners with an AI-guided workspace built to turn scan data into immediate action. By selecting a target domain and scan scope, teams can launch a focused security conversation that helps prioritize risk, interpret findings faster, and streamline next-step decisions without digging through fragmented reports.

  • Scan-Aware AI Analysis: Send selected domain and scan data into an AI thread built around your actual security results.

  • Faster Risk Prioritization: Help leadership and operators identify what needs attention first without manual sorting.

  • Domain-Specific Context: Keep analysis focused on the selected target domain for cleaner, more relevant insights.

  • Saved Security Conversations: Preserve AI chats for future review, follow-up, and operational continuity.

Static Code Analysis for WordPress Risk Visibility

Give security executives and site owners a clear view into code-level risk across the WordPress stack. This dashboard surfaces cached static analysis findings by plugin, file, severity, and rule category, making it easier to spot weak points in site components, prioritize remediation, and maintain a stronger security posture without digging through raw technical output.

  • Plugin-Level Risk Breakdown: See which plugins and site components contribute to your code-security exposure.

  • Severity-Driven Prioritization: Quickly separate high, medium, and low findings so teams can focus on what matters first.

  • Executive-Friendly Visibility: Turn technical static analysis into a format leadership and site owners can actually review.

  • Faster Remediation Workflow: Filter findings by severity and plugin to help developers fix issues with less noise and more precision.

DAST Scan Reports / Attack Surface Inventory

Give security leaders and site owners an instant, board-ready view of live application exposure. This dashboard turns complex scan data into clear operational insight by showing route coverage, API footprint, auth-context visibility, verification status, and attack surface inventory in one place so teams can quickly understand where risk exists and where validation is still needed.

  • Complete Surface Visibility: See routes, APIs, auth contexts, and graph coverage in one unified view.

  • Verification-Aware Reporting: Distinguish observed, suspected, verified, and safe-validated results for faster triage.

  • Inventory That Matters: Track pages, forms, APIs, scripts, and sensitive unauthenticated endpoints at a glance.

  • Built for Decision Makers: Turn technical scan data into actionable insight for security teams and site owners.

From Detection to Remediation in One Workflow

Move beyond raw findings and into real response. This detailed finding view gives executives and operators the full story behind every issue: severity, rule ID, evidence, trigger logic, reproduction steps, remediation guidance, and validation instructions while built-in AI remediation instructions helps teams accelerate closure without losing context.

  • Deep Finding Context: Review severity, lifecycle, evidence, HTTP method, role context, and response behavior in one place.

  • Faster Remediation: Use AI-powered remediation guidance to shorten the time from discovery to fix.

  • Reproducible Security Testing: Follow exact reproduction steps so engineering teams can validate and resolve issues confidently.

  • Closure Validation Ready: Retest the rule and confirm remediation with evidence-backed verification

Risk Organized by Rule Family, Not Noise

Turn overwhelming scan output into structured, decision-ready intelligence. By organizing findings into rule families like Injection, Auth & Session, Access Control, API Security, Browser/Client-Side, Exposure & Hardening, Workflow/Business Logic, and Discovery & Inventory, this view helps security teams prioritize systemic weaknesses while giving site owners a clearer picture of where their application posture needs attention.

  • Category-Driven Prioritization: Focus on the classes of weakness that create the biggest operational and business risk.

  • Faster Executive Review: Summarized rule-family groupings make it easier to explain exposure to leadership and stakeholders.

  • Clearer Remediation Planning: Identify repeat patterns across the application so fixes can be handled strategically, not one-off.

  • Balanced Visibility: View both active weaknesses and passed checks to understand overall posture, not just failures.

Payload Family Engine for Real-World Attack Simulation

See how your application stands up against the attack patterns that matter most. The Payload Family Engine organizes results by offensive test family such as XSS, SSRF, file upload, JSON/body pollution, GraphQL abuse, IDOR/BOLA, and privilege escalation giving security teams a clearer way to understand coverage, validation mode, and the concentration of risk across modern web applications and APIs.

  • Family-Based Risk Breakdown: Group findings by real attack families instead of forcing teams to hunt through generic logs.

  • Coverage Across Modern Threats: Assess everything from reflected XSS to GraphQL abuse and broken object-level access patterns.

  • Confidence-Driven Prioritization: Surface verified and high-confidence results so teams can focus on what matters first.

  • Safe Validation Modes: Test aggressively while maintaining controlled validation paths for production-friendly security checks.

OWASP-Aligned Reporting with Explorable Security Context

Translate technical findings into recognized security frameworks your leadership team already understands. This view maps results to OWASP Top 10, OWASP API Top 10, and WSTG test areas while also exposing role access matrices, API exploration, route contracts, and auth-context insight helping security executives communicate risk clearly and helping site owners understand where protection needs to improve.

  • Framework-Mapped Findings: Connect scan results directly to OWASP and WSTG categories for easier reporting and prioritization.

  • API and Route Visibility: Explore routes, contracts, and API behavior to understand where business logic and exposure intersect.

  • Role Boundary Insight: Review role access and auth boundaries to spot privilege and authorization weaknesses faster.

  • Executive-Friendly Security Storytelling: Present findings in language leadership can understand without losing technical depth.