LIVE OUTPUT

Real Auditor Core v2.2 Output

Three output formats from a single scan of the Django open-source project โ€” 1,329 findings, 11 detectors, AI false-positive filter applied.

19
CRITICAL
15
HIGH
94
MEDIUM
1201
LOW
38.25
SPI Score
7
AI Excluded
92.5%
Core/Prod

PDF Executive Summary

7-page audit-ready document with Risk Dashboard, Compliance Coverage, Key Findings with source evidence, Remediation Roadmap, SOC 2 control exposure table, and Attestation block with signature lines.

report_django.pdf โ€” Page 1 of 7 ยท Security Assessment Report

Click any page to enlarge  ยท  Showing pages 1โ€“6 of 7 (page 7 is attestation/signatures)

Interactive HTML Report

Enterprise posture dashboard with severity filters, inline AI analysis blocks, SOC 2 / CIS / ISO 27001 compliance tags per finding, and full WSPM scoring breakdown.

report_django.html โ€” SPI 38.25 ยท Grade D ยท 1329 findings
HTML Report โ€” Header & SPI
HTML Report โ€” WSPM Methodology
HTML Report โ€” AI Analysis Block
HTML Report โ€” Findings with compliance tags

Click any screenshot to enlarge  ยท  4 sections shown

Machine-Readable JSON

Every finding includes compliance_mapping, instance_count, instance_lines, and AI verdict. Top-level framework_summary aggregates all triggered controls โ€” ready for SIEM or CI/CD gating.

// framework_summary โ€” aggregated across all 1329 findings { "framework_summary": { "SOC2": { "controls_triggered": 9, "top_control": "CC6.1", "findings_mapped": 695 }, "CIS": { "controls_triggered": 10, "top_control": "CIS-16.1", "findings_mapped": 836 }, "ISO27001": { "controls_triggered": 12, "top_control": "A.8.24", "findings_mapped": 653 } }, "spi": 38.25, "grade": "D", "weighted_exposure": 187.87, "k_factor": 195.51, "ai_excluded": 7, // individual finding entry "findings": [ { "rule_id": "SAST_SQL_INJECTION", "severity": "CRITICAL", "location": "django/contrib/postgres/operations.py:303", "detector": "SastScanner", "instance_count": 1, "instance_lines": [303], "cvss": 5.78, "ai_verdict": null, "compliance_mapping": { "SOC2": ["CC6.1", "CC6.6", "CC7.1"], "CIS": ["CIS-16.12", "CIS-16.1", "CIS-7.5"], "ISO27001": ["A.8.28", "A.8.26"] } }, { "rule_id": "SAST_COMMAND_INJECTION", "severity": "CRITICAL", "location": "django/template/smartif.py", "instance_count": 16, "instance_lines": [59, 86, 99, 100, 101, "..."], "ai_verdict": "NOT_SUPPORTED", "ai_confidence": 0.97, "compliance_mapping": { "SOC2": ["CC6.6", "CC7.1"], "CIS": ["CIS-16.1", "CIS-16.12", "CIS-7.5"], "ISO27001": ["A.8.28", "A.8.26", "A.8.29"] } } // ... 1327 more findings ] }
REPORT GUIDE

How to Read This Report

Every metric in the Auditor Core report belongs to one of three independent layers: Technical Findings, Risk Modeling (WSPM v2.2 โ†’ SPI), and Compliance Mapping.

A normalized exponential risk score from 0โ€“100. Higher = safer. Lower = higher exposure.

Formula: SPI = 100 ร— eโป(WeightedExposure / K)

Weighted Exposure โ€” sum of findings after severity weighting, context modeling (prod vs test), AI verification, and reachability scaling. NOT raw CVSS sum โ€” it is post-processed business exposure.

K (Dynamic K-Factor) โ€” controls sensitivity of the exponential curve. Higher K โ†’ score drops slower. Lower K โ†’ drops faster. Deterministic given same inputs.

Gate Override (v2.2): If CRITICAL findings exist in production code, effective grade is capped at C โ€” regardless of SPI score. Numeric score and policy decision are separate layers.

Grade is derived from the SPI band:

A โ€” 90โ€“100
Hardened / Resilient
B โ€” 75โ€“89
Guarded
C โ€” 60โ€“74
Elevated Risk
D โ€” 40โ€“59
High Risk
D โ€” <40
Critical Risk

Core/Prod โ€” findings in runtime code paths. Affect SPI at full weight.

Test/Noise โ€” findings in /tests/, example files, non-runtime modules. Down-weighted in exposure model.

If a vulnerability exists only in test files โ€” it remains visible in the report BUT does not penalize insurance-grade SPI equally. This prevents false business risk inflation. The Django report shows 92.5% Core/Prod โ€” meaning exposure is concentrated in production code.

Reachable โ€” finding is on a confirmed execution path (e.g. unsanitized user input reaching SQL). Retains full exposure weight.

Static-Safe โ€” finding exists but cannot be triggered at runtime (dead code, sanitized path). Heavily down-weighted.

Unknown โ€” engine cannot confirm reachability (dynamic imports, reflection, indirect chains). Partially weighted.

Sensitivity Snapshot โ€” stress-test scenario: what if ALL unknown findings were confirmed exploitable? Shows worst-case SPI drop. Not current posture.

When AI analysis was applied, each finding shows one of:

  • ๐Ÿ”ฅ AI VERIFIED โ€” finding confirmed as real and exploitable
  • ๐Ÿ›ก๏ธ AI FALSE POSITIVE โ€” finding dismissed after architectural analysis
  • โš™๏ธ INTEL: REACHABLE / STATIC_SAFE / UNKNOWN โ€” reachability verdict

The AI block includes architectural reasoning, exploit chain (if detected), taint sources, and function-level trace. AI verification influences exposure modeling โ€” it does not overwrite raw findings.

Important: Credibility: STABLE (100/100) measures pipeline reliability โ€” not security level.

Each finding is automatically tagged to control domains it impacts:

  • CC6.1 โ†’ Logical and Physical Access Controls
  • CC7.1 โ†’ Vulnerability Detection & Monitoring
  • CIS-16.12 โ†’ Secure Coding Practices
  • ISO A.8.28 โ†’ Secure Development Lifecycle

These tags transform findings into compliance evidence. The framework_summary in JSON aggregates all triggered controls across the entire scan โ€” ready for direct submission to SOC 2 auditors or cyber insurance underwriters.

Note: Compliance tags are informational metadata and do not constitute formal compliance certification or audit attestation.

1. Technical Findings

Raw detections from 11 engines. Answers: "What was found?"

2. Risk Modeling (SPI)

WSPM v2.2 scoring. Answers: "How exposed is this codebase?"

3. Compliance Mapping

SOC 2 / CIS / ISO tags. Answers: "Which controls are affected?"

Policy verdict (PASS / WARN / BLOCK / FAIL) is an additional governance layer on top of these three.

Full Technical Documentation โ†’

Run This Against Your Codebase

Get your hardware-bound license and produce PDF, HTML, and JSON reports in minutes โ€” locally, with zero telemetry.

No telemetry ยท 100% local ยท Python 3.10+ ยท Linux / macOS