7-page audit-ready document with Risk Dashboard, Compliance Coverage, Key Findings with source evidence, Remediation Roadmap, SOC 2 control exposure table, and Attestation block with signature lines.
Click any page to enlarge ยท Showing pages 1โ6 of 7 (page 7 is attestation/signatures)
Enterprise posture dashboard with severity filters, inline AI analysis blocks, SOC 2 / CIS / ISO 27001 compliance tags per finding, and full WSPM scoring breakdown.
Click any screenshot to enlarge ยท 4 sections shown
Every finding includes compliance_mapping, instance_count, instance_lines, and AI verdict. Top-level framework_summary aggregates all triggered controls โ ready for SIEM or CI/CD gating.
Every metric in the Auditor Core report belongs to one of three independent layers: Technical Findings, Risk Modeling (WSPM v2.2 โ SPI), and Compliance Mapping.
A normalized exponential risk score from 0โ100. Higher = safer. Lower = higher exposure.
Formula: SPI = 100 ร eโป(WeightedExposure / K)
Weighted Exposure โ sum of findings after severity weighting, context modeling (prod vs test), AI verification, and reachability scaling. NOT raw CVSS sum โ it is post-processed business exposure.
K (Dynamic K-Factor) โ controls sensitivity of the exponential curve. Higher K โ score drops slower. Lower K โ drops faster. Deterministic given same inputs.
Grade is derived from the SPI band:
Core/Prod โ findings in runtime code paths. Affect SPI at full weight.
Test/Noise โ findings in /tests/, example files, non-runtime modules. Down-weighted in exposure model.
If a vulnerability exists only in test files โ it remains visible in the report BUT does not penalize insurance-grade SPI equally. This prevents false business risk inflation. The Django report shows 92.5% Core/Prod โ meaning exposure is concentrated in production code.
Reachable โ finding is on a confirmed execution path (e.g. unsanitized user input reaching SQL). Retains full exposure weight.
Static-Safe โ finding exists but cannot be triggered at runtime (dead code, sanitized path). Heavily down-weighted.
Unknown โ engine cannot confirm reachability (dynamic imports, reflection, indirect chains). Partially weighted.
Sensitivity Snapshot โ stress-test scenario: what if ALL unknown findings were confirmed exploitable? Shows worst-case SPI drop. Not current posture.
When AI analysis was applied, each finding shows one of:
The AI block includes architectural reasoning, exploit chain (if detected), taint sources, and function-level trace. AI verification influences exposure modeling โ it does not overwrite raw findings.
Important: Credibility: STABLE (100/100) measures pipeline reliability โ not security level.
Each finding is automatically tagged to control domains it impacts:
CC6.1 โ Logical and Physical Access ControlsCC7.1 โ Vulnerability Detection & MonitoringCIS-16.12 โ Secure Coding PracticesISO A.8.28 โ Secure Development LifecycleThese tags transform findings into compliance evidence. The framework_summary in JSON aggregates all triggered controls across the entire scan โ ready for direct submission to SOC 2 auditors or cyber insurance underwriters.
Note: Compliance tags are informational metadata and do not constitute formal compliance certification or audit attestation.
Raw detections from 11 engines. Answers: "What was found?"
WSPM v2.2 scoring. Answers: "How exposed is this codebase?"
SOC 2 / CIS / ISO tags. Answers: "Which controls are affected?"
Policy verdict (PASS / WARN / BLOCK / FAIL) is an additional governance layer on top of these three.