If our Attack Simulator successfully proves a vulnerability (SQL injection, logic bypass, etc.), the risk score is automatically set to 100 regardless of the base calculation.
Uses the Luhn Algorithm to mathematically verify credit card numbers. Zero false positives - only flags actual valid card numbers.
Uses AST (Abstract Syntax Tree) parsing to inject SQL payloads safely. If the parser accepts our injection, the code is provably vulnerable.
A mathematical algorithm used to validate credit card numbers. Created by IBM researcher Hans Luhn, it uses a checksum formula to verify that a sequence of digits is a valid payment card number, preventing false positives in credit card detection.
Abstract Syntax Tree parsing converts code into a structured tree representation, allowing us to analyze and modify SQL queries programmatically. We use this to test if our injection payloads create valid SQL syntax, proving vulnerability existence.
A code injection technique where malicious SQL statements are inserted into application entry points. Our simulator tests for this by injecting payloads like "' OR '1'='1" to bypass authentication logic and gain unauthorized database access.
Payment Card Industry Data Security Standard - a comprehensive set of security requirements for organizations that handle credit card data. Violations can result in fines ranging from $10K to $5M+ depending on the merchant level and severity of non-compliance.