Once the scan is started, an email with a link of will also notifies you “scan status view”. So don’t worry if you close the browser. You can always check your email and go to a status page.
The scan may take a few hours if you have selected to scan “Whole site” so keep patience. Once a scan is done, an email will notify you.
Upon login, you will also see those details in the nice dashboard with severities, vulnerabilities for you to take action.
You can also export the report by following in XML, CSV, PDF, or HTML format.
Detailed Scan Report
Here is how the executive summary looks like.
Not good, I got to fix them shortly.
How about you? Haven’t you done the scanning yet, go ahead and explore the vulnerabilities and fix them before bad guys find and make your website unavailable?
Chandan Kumar is the founder of Geekflare. He’s helped millions to excel in the digital realm. Passionate about technology, He’s on a mission to explore the world and amplify growth for professionals and businesses.
Both JWT and OAuth can help you enhance the security of your web application by offering secure authentication and authorization. But which one should you implement to allow users to access your web application securely? We have prepared a detailed article on JWT vs. OAuth to answer this question.