Skip to main content

Current Coverage

Shannon currently targets the following classes of exploitable vulnerabilities:

Critical OWASP Vulnerability Categories

Injection

  • SQL Injection (SQLi)
  • Command Injection
  • Code Injection
  • Server-Side Template Injection (SSTI)

Cross-Site Scripting

  • Reflected XSS
  • Stored XSS
  • DOM-based XSS
  • HTML Injection

Authentication & Authorization

  • Broken Authentication
  • Broken Authorization
  • Privilege Escalation
  • Insecure Direct Object References (IDOR)
  • OAuth Weaknesses
  • JWT Vulnerabilities

Server-Side Request Forgery

  • Internal Network Access
  • Cloud Metadata Exploitation
  • Port Scanning
  • Protocol Smuggling

Detailed Testing Checklist

The table below shows specific Web Security Testing (WST) categories and items that Shannon consistently and reliably addresses. Our coverage is strategically focused on WST controls applicable to today’s web application technology stacks.

Information Gathering

Test IDTest NameStatus
WSTG-INFO-02Fingerprint Web Server
WSTG-INFO-06Identify Application Entry Points
WSTG-INFO-07Map Execution Paths Through Application
WSTG-INFO-08Fingerprint Web Application Framework
WSTG-INFO-09Fingerprint Web Application
WSTG-INFO-10Map Application Architecture

Configuration Testing

Test IDTest NameStatus
WSTG-CONF-01Test Network Infrastructure Configuration
WSTG-CONF-10Test for Subdomain Takeover

Identity Management

Test IDTest NameStatus
WSTG-IDNT-01Test Role Definitions
WSTG-IDNT-02Test User Registration Process
WSTG-IDNT-03Test Account Provisioning Process
WSTG-IDNT-04Testing for Account Enumeration and Guessable User Account
WSTG-IDNT-05Testing for Weak or Unenforced Username Policy

Authentication Testing

Test IDTest NameStatus
WSTG-ATHN-01Testing for Credentials Transported over an Encrypted Channel
WSTG-ATHN-02Testing for Default Credentials
WSTG-ATHN-03Testing for Weak Lock Out Mechanism
WSTG-ATHN-04Testing for Bypassing Authentication Schema
WSTG-ATHN-07Testing for Weak Password Policy
WSTG-ATHN-08Testing for Weak Security Question Answer
WSTG-ATHN-09Testing for Weak Password Change or Reset Functionalities
WSTG-ATHN-10Testing for Weaker Authentication in Alternative Channel
WSTG-ATHN-11Testing Multi-Factor Authentication (MFA)

Authorization Testing

Test IDTest NameStatus
WSTG-ATHZ-01Testing Directory Traversal File Include
WSTG-ATHZ-02Testing for Bypassing Authorization Schema
WSTG-ATHZ-03Testing for Privilege Escalation
WSTG-ATHZ-04Testing for Insecure Direct Object References
WSTG-ATHZ-05Testing for OAuth Weaknesses

Session Management

Test IDTest NameStatus
WSTG-SESS-01Testing for Session Management Schema
WSTG-SESS-02Testing for Cookies Attributes
WSTG-SESS-03Testing for Session Fixation
WSTG-SESS-05Testing for Cross Site Request Forgery
WSTG-SESS-06Testing for Logout Functionality
WSTG-SESS-07Testing Session Timeout
WSTG-SESS-10Testing JSON Web Tokens

Input Validation

Test IDTest NameStatus
WSTG-INPV-01Testing for Reflected Cross Site Scripting
WSTG-INPV-02Testing for Stored Cross Site Scripting
WSTG-INPV-05Testing for SQL Injection
WSTG-INPV-11Testing for Code Injection
WSTG-INPV-12Testing for Command Injection
WSTG-INPV-18Testing for Server-Side Template Injection
WSTG-INPV-19Testing for Server-Side Request Forgery

Cryptography

Test IDTest NameStatus
WSTG-CRYP-01Testing for Weak Transport Layer Security
WSTG-CRYP-03Testing for Sensitive Information Sent Via Unencrypted Channels

Client-Side Testing

Test IDTest NameStatus
WSTG-CLNT-01Testing for DOM Based Cross Site Scripting
WSTG-CLNT-02Testing for JavaScript Execution
WSTG-CLNT-03Testing for HTML Injection
WSTG-CLNT-04Testing for Client-Side URL Redirect
WSTG-CLNT-12Test Browser Storage
WSTG-CLNT-13Testing for Cross Site Script Inclusion

API Testing

Test IDTest NameStatus
WSTG-APIT-01API Reconnaissance
WSTG-APIT-02API Broken Object Level Authorization
WSTG-APIT-99Testing GraphQL

What Shannon Does Not Cover

This list is not exhaustive of all potential security risks. Shannon’s “proof-by-exploitation” model means it will not report on issues it cannot actively exploit.

Static Analysis Findings

Shannon does not currently report on:
  • Vulnerable Third-Party Libraries: Outdated dependencies with known CVEs
  • Weak Encryption Algorithms: Use of deprecated cryptographic methods
  • Insecure Configurations: Server misconfigurations that don’t lead to exploits
  • Code Quality Issues: Security anti-patterns without exploitable impact
  • Compliance Violations: Security policy violations without technical exploitation
These types of deep static-analysis findings are the focus of our upcoming Keygraph Code Security (SAST) product and are available in Shannon Pro through its advanced data flow analysis engine.

Out of Scope Vulnerabilities

Certain vulnerability categories require specialized testing approaches:
  • Business Logic Flaws: Application-specific workflow bypasses
  • Race Conditions: Timing-dependent vulnerabilities
  • Cryptographic Weaknesses: Advanced cryptanalysis
  • Physical Security: Hardware and physical access controls
  • Social Engineering: Human factor exploitation
  • Denial of Service: Resource exhaustion attacks

Real-World Performance

Shannon has demonstrated its capabilities on industry-standard vulnerable applications:

OWASP Juice Shop

  • 20+ critical vulnerabilities identified
  • Complete authentication bypass
  • Full database exfiltration
  • Privilege escalation to administrator
  • SSRF exploitation for internal network access

ctal API (Checkmarx)

  • ~15 critical/high vulnerabilities discovered
  • Root-level command injection
  • Authentication bypass via legacy API
  • Mass assignment privilege escalation
  • Zero false positives on XSS defenses

OWASP crAPI

  • 15+ critical/high vulnerabilities validated
  • Multiple JWT attack vectors (alg confusion, alg:none, weak keys)
  • Full database compromise
  • Critical SSRF with token forwarding
  • Zero false positives on XSS defenses

Roadmap

We are actively working to expand coverage to provide a more comprehensive security solution for modern web applications. While Shannon’s dynamic detection often extends beyond the checked categories, we only mark vulnerabilities we consistently and reliably catch.

Upcoming Coverage Areas

  • Additional injection types (LDAP, XML, XPath)
  • Business logic testing automation
  • Enhanced API security testing
  • Mobile application security
  • Container and cloud-native security

Build docs developers (and LLMs) love