📄️ Security Checks
Configure security check options in Invicti Enterprise and Invicti Standard including enabling, disabling, and customizing vulnerability checks in scan policies.
📄️ How Invicti reports vulnerabilities
Comprehensive list of security checks and corresponding vulnerabilities reported by Invicti including SQL injection, XSS, CSRF, code evaluation, and other web application vulnerabilities.
📄️ Identifying sensitive data
Learn how Invicti identifies and protects against sensitive data exposure by scanning applications for confidential information including API keys, credentials, and personally identifiable information.