Overview
This guide explains how to view and analyze Web Application Security scan results in DeepTraQ. After a scan completes, DeepTraQ consolidates all findings into a centralized dashboard, allowing security teams to quickly assess vulnerabilities and prioritize remediation.
The results interface provides detailed insights that help teams:
- Identify vulnerabilities affecting web applications
- Understand severity, impact, and exploitability
- Review technical evidence behind findings
- Filter vulnerabilities to focus on high-risk issues
- Track vulnerability trends across historical scans
This unified view helps security teams and stakeholders understand the current security posture of their web applications.
Prerequisites
- A completed Web Application Security scan
- Access to the DeepTraQ scanning dashboard
- Permissions to view scan results and vulnerability details
Steps
-
Navigate to the Scans Dashboard and open the Web Application Security module.
-
Access the scan activity log to view all web application scans.
-
Select a project or application scan to open its detailed results.
-
Review the Vulnerabilities section, where all detected issues are listed.
-
Each vulnerability entry displays important details such as:
- Severity level
- Affected component or endpoint
- Vulnerability classification
- Security score
-
Select a vulnerability to open the detailed vulnerability view.
-
Review the vulnerability information, including:
- Description
- Impact analysis
- Recommended remediation steps
- Reference links
-
View the Raw Output section to examine the technical data generated by the scanner.
-
Review additional vulnerability metadata, including:
- Vulnerability classification
- Risk score
- References to security standards or advisories
-
Add comments if collaboration or internal documentation is required for remediation tracking.
-
Use filters to narrow down vulnerabilities based on attributes such as:
- Severity
- Target component
- Scan history
- Issue status
-
Apply filtering to focus on vulnerabilities that require immediate attention.
-
Open the Executive Summary tab to view a high-level overview of the scan results.
-
Review key metrics including:
- Total vulnerabilities discovered
- Severity distribution
- Major risk insights affecting the application
-
Navigate to the Scan History tab to review previous scan executions.
-
Compare historical scans to identify newly discovered vulnerabilities and measure remediation progress over time.
Field Reference
| Field | Description | Example |
|---|---|---|
| Vulnerability Name | Identified security issue affecting the application | Cross-Site Scripting (XSS) |
| Severity | Risk level assigned to the vulnerability | High |
| Description | Explanation of the vulnerability and how it affects the application | Improper input validation allows script injection |
| Risk Score | Security score used to measure vulnerability severity | 7.5 |
| Raw Output | Technical scan evidence captured during testing | HTTP request and response details |
| References | External resources describing the vulnerability | OWASP documentation |
| Comments | Internal notes added by users for remediation tracking | Investigating fix in authentication module |