Skip to main content

Overview

This guide explains how to view and analyze Web Application Security scan results in DeepTraQ. After a scan completes, DeepTraQ consolidates all findings into a centralized dashboard, allowing security teams to quickly assess vulnerabilities and prioritize remediation.

The results interface provides detailed insights that help teams:

  • Identify vulnerabilities affecting web applications
  • Understand severity, impact, and exploitability
  • Review technical evidence behind findings
  • Filter vulnerabilities to focus on high-risk issues
  • Track vulnerability trends across historical scans

This unified view helps security teams and stakeholders understand the current security posture of their web applications.


Prerequisites

  • A completed Web Application Security scan
  • Access to the DeepTraQ scanning dashboard
  • Permissions to view scan results and vulnerability details

Steps

  1. Navigate to the Scans Dashboard and open the Web Application Security module.

  2. Access the scan activity log to view all web application scans.

  3. Select a project or application scan to open its detailed results.

  4. Review the Vulnerabilities section, where all detected issues are listed.

  5. Each vulnerability entry displays important details such as:

    • Severity level
    • Affected component or endpoint
    • Vulnerability classification
    • Security score
  6. Select a vulnerability to open the detailed vulnerability view.

  7. Review the vulnerability information, including:

    • Description
    • Impact analysis
    • Recommended remediation steps
    • Reference links
  8. View the Raw Output section to examine the technical data generated by the scanner.

  9. Review additional vulnerability metadata, including:

    • Vulnerability classification
    • Risk score
    • References to security standards or advisories
  10. Add comments if collaboration or internal documentation is required for remediation tracking.

  11. Use filters to narrow down vulnerabilities based on attributes such as:

  • Severity
  • Target component
  • Scan history
  • Issue status
  1. Apply filtering to focus on vulnerabilities that require immediate attention.

  2. Open the Executive Summary tab to view a high-level overview of the scan results.

  3. Review key metrics including:

  • Total vulnerabilities discovered
  • Severity distribution
  • Major risk insights affecting the application
  1. Navigate to the Scan History tab to review previous scan executions.

  2. Compare historical scans to identify newly discovered vulnerabilities and measure remediation progress over time.


Field Reference

FieldDescriptionExample
Vulnerability NameIdentified security issue affecting the applicationCross-Site Scripting (XSS)
SeverityRisk level assigned to the vulnerabilityHigh
DescriptionExplanation of the vulnerability and how it affects the applicationImproper input validation allows script injection
Risk ScoreSecurity score used to measure vulnerability severity7.5
Raw OutputTechnical scan evidence captured during testingHTTP request and response details
ReferencesExternal resources describing the vulnerabilityOWASP documentation
CommentsInternal notes added by users for remediation trackingInvestigating fix in authentication module