Audit & Triage
The Audit module is where security teams review, analyze, and triage scan findings. Examine vulnerabilities with full data flow context, categorize findings, and track your audit progress across projects.
Audit Module
The Audit module presents all detected vulnerabilities from your scans in a structured table view. Each finding includes its severity level, vulnerability category, affected file path, and current audit state, allowing security teams to quickly prioritize and work through findings.
Audit Table Features
Vulnerability Categories
GraphNode organizes all detected vulnerabilities into eight main categories aligned with industry standards such as OWASP and CWE. This categorization helps teams understand the nature of each finding and prioritize remediation efforts effectively.
Authentication
Authentication bypass, weak authentication mechanisms, missing multi-factor authentication enforcement.
Authorization
Privilege escalation, missing access controls, insecure direct object references (IDOR).
Code Quality
Null pointer dereference, resource leaks, dead code, race conditions, and other quality issues.
Configuration
Insecure defaults, debug mode enabled in production, overly permissive CORS settings.
Cryptography
Weak algorithms (MD5, SHA1), hardcoded encryption keys, insufficient key lengths, insecure random number generation.
Input Validation
SQL Injection, Cross-Site Scripting (XSS), Command Injection, Path Traversal, LDAP Injection, and XML External Entity (XXE).
Session Management
Session fixation, insecure session handling, missing session expiration, cookie security misconfiguration.
Miscellaneous
Other security findings including information disclosure, error handling issues, and logging sensitive data.
Code Review & Data Flow
Clicking on any vulnerability in the audit table opens the code review panel. This panel shows the source code with the vulnerable line highlighted and, most importantly, displays the complete Vulnerability Flow -- GraphNode's deep taint tracking that traces how untrusted data propagates from its source to a dangerous sink function.
Source
The point where untrusted data enters the application -- typically user input from HTTP requests, file uploads, or external APIs.
Propagation
Intermediate steps where tainted data is passed through variables, method calls, and transformations without proper sanitization.
Sink
The dangerous function where tainted data is consumed -- such as database queries, OS commands, or HTML rendering.
Vulnerability Details
Each detected vulnerability includes a comprehensive detail card providing everything security teams and developers need to understand and remediate the issue, including CWE references, remediation guidance, and compliance mapping.
Detail Card Contents
False-Positive Triage
Every vulnerability detected by GraphNode starts in a Not Audited state. The triage workflow enables security teams to review each finding and assign one of four states. This process helps teams focus on confirmed threats, filter noise from false positives, and track audit progress over time.
| State | Description | Action |
|---|---|---|
| Not Audited | Default state for all new findings. The vulnerability has not yet been reviewed by a security auditor. | Needs review |
| Exploitable | Confirmed as a real, exploitable vulnerability. Should be prioritized for remediation by the development team. | Fix required |
| False Positive | Reviewed and determined to not be a real security issue. The finding is a false alarm and requires no action. | No action |
| Suppressed | Known issue with accepted risk. The vulnerability is real but has been consciously deferred or accepted by the team. | Risk accepted |