// 漏洞聚焦
FixVibe 运行的每一项检查,
通通讲清楚。
FixVibe 自带 69+ 个漏洞类别。每条记录每次扫描最多运行 35 项子检查,详细讲解漏洞如何工作、攻击者能从中得到什么、我们如何检测以及如何防御。
01 / 07
HTTP 与表面
Session Cookie Attributes
HttpOnly, Secure, SameSite — three flags that turn a session cookie into something attackers can't easily steal.
阅读聚焦 →
HTTP Security Headers
Headers are free defense — most apps still ship without them.
阅读聚焦 →
TLS Configuration
Old cipher suites plus missing HSTS equals a hostile WiFi away from session hijack.
阅读聚焦 →
Vercel Deployment Protection
Generated deployment URLs should not become public staging doors.
阅读聚焦 →
02 / 07
密钥
Hard-coded Secret Patterns
Stripe keys, AWS credentials, OpenAI tokens — pattern matching catches the easy mistakes.
阅读聚焦 →
Secrets in JavaScript Bundles
If it shipped in your client bundle, it's not a secret — it's a publication.
阅读聚焦 →
JWT Integrity (alg confusion, weak secrets)
If your JWT verifier trusts the token's own header, it will believe whatever the attacker types.
阅读聚焦 →
Tokens in Browser Storage
localStorage is JavaScript-readable. Auth tokens stored there are XSS-stealable by design.
阅读聚焦 →
Exposed Source Maps
If your .map files are public, the attacker is reading your TypeScript.
阅读聚焦 →
Information Leakage in JavaScript
Internal API hosts, version banners, and TODO comments — small leaks add up to a map of your stack.
阅读聚焦 →
03 / 07
Backend-as-a-Service
Firebase Security Rules
`allow read, write: if true` is somebody's production database right now.
阅读聚焦 →
Supabase Row-Level Security
Without RLS on every public table, your anon key is a license to read anything.
阅读聚焦 →
Clerk & Auth0 Configuration
Identity providers leak more than they should when defaults aren't tightened.
阅读聚焦 →
Supabase Storage and API Posture
Public buckets and anon-listable objects are where BaaS data leaks start.
阅读聚焦 →
04 / 07
DNS
05 / 07
探索
CVE Cross-Reference
Detected version + public CVE database = a list of attacks already documented.
阅读聚焦 →
Debug & Admin Endpoints
/debug, /admin, /server-status — paths that should never be reachable from the internet.
阅读聚焦 →
Exposed Files & Backup Directories
.env, .git, .DS_Store, backup.sql — files that should never be public, accidentally are.
阅读聚焦 →
SPIP Template RCE Version Exposure
Public SPIP version banners can reveal an RCE-class patch gap.
阅读聚焦 →
Cloudflare Origin & Proxy Posture
If your origin IP is discoverable, Cloudflare's WAF is bypassable.
阅读聚焦 →
GraphQL Introspection Exposed
Introspection in production hands the attacker your full type system.
阅读聚焦 →
Threat-Intel Cross-Reference
Spamhaus DBL, URLhaus — your domain's reputation, externally seen.
阅读聚焦 →
Exposed API Documentation
/swagger.json, /openapi.json, /docs — public API maps for both you and the attacker.
阅读聚焦 →
Netlify-Specific Exposure
Netlify deploy preview URLs, x-nf-* headers, _redirects mistakes.
阅读聚焦 →
Privacy & Cookie Compliance Markers
GDPR-required pages — present and linked, or you're at risk of a complaint.
阅读聚焦 →
Technology Fingerprinting
Knowing your stack is half the recon — outdated frameworks turn that into the other half.
阅读聚焦 →
Vercel-Specific Exposure
_next/static, x-vercel-* headers, preview URLs — Vercel-isms that leak more than they should.
阅读聚焦 →
06 / 07
主動探測
Cross-Tenant Data Leaks
Multi-tenant SaaS without tenant ID enforcement leaks customer data across orgs.
阅读聚焦 →
JWT alg=none Acceptance
A decoded token is not an authenticated identity.
阅读聚焦 →
OS Command Injection
When user input becomes part of a shell command, the shell runs whatever the attacker writes.
阅读聚焦 →
Server-Side Template Injection (SSTI)
When a template engine treats user input as a template, the server treats user input as code.
阅读聚焦 →
SQL Injection
When user input becomes part of a query, the database stops being yours.
阅读聚焦 →
Auth Flow Defects
Login, signup, and password reset are where most account takeovers actually happen.
阅读聚焦 →
Blind SSRF (Out-of-Band)
If the server fetches user-supplied URLs, the user can make it fetch internal services.
阅读聚焦 →
CKAN DataStore SQL Authorization Bypass
Public DataStore SQL access can turn open data APIs into private data exposure.
阅读聚焦 →
CORS Misconfiguration
Permissive Access-Control-Allow-Origin plus credentials means your API is everyone's API.
阅读聚焦 →
DOM-based XSS via URL Fragment
Modern SPAs read location.hash and write it into the DOM — attacker payloads ride along.
阅读聚焦 →
File Upload Validation
User-uploaded files are arbitrary bytes — accepting them as 'images' without checking is asking for RCE.
阅读聚焦 →
FUXA Hardcoded JWT Fallback Secret
Default token-signing secrets can turn an HMI login into a weak boundary.
阅读聚焦 →
GraphQL Depth Bombing & Batch Bypass
GraphQL's flexibility is also its vulnerability — depth bombs, alias batching, and field-suggestion leaks.
阅读聚焦 →
HTTP Request Smuggling
Front-end proxy and back-end disagree on where one request ends — attacker rides the seam.
阅读聚焦 →
IDOR / BOLA
If your API trusts the client to send the correct ID, the client can send any ID.
阅读聚焦 →
LLM Prompt Injection
If your AI feature trusts user input as instruction, the user can rewrite the system prompt.
阅读聚焦 →
NoSQL Operator Injection
MongoDB-style operators in user-controlled JSON turn your query into a wildcard.
阅读聚焦 →
Reflected Cross-Site Scripting (XSS)
The silent hijack: when a single unsanitized parameter executes attacker code in your users' browsers.
阅读聚焦 →
XML External Entity (XXE)
If your XML parser resolves external entities, your server reads files for the attacker.
阅读聚焦 →
ZoneMinder Directory Listing Exposure
A camera management UI should not publish its web root index.
阅读聚焦 →
Account Enumeration
If your login responds differently when the email exists vs doesn't, attackers can build a customer list.
阅读聚焦 →
Confirming Next.js middleware bypass exposure
Confirming Next.js middleware bypass exposure
阅读聚焦 →
CRLF / Response Splitting
If user input lands in a response header, line breaks let the attacker write their own headers.
阅读聚焦 →
CSRF Protection
If your state-changing endpoints don't require a CSRF token, third-party sites can act as your users.
阅读聚焦 →
Missing Rate Limiting
Without rate limits on auth endpoints, the attacker can credential-stuff at line speed.
阅读聚焦 →
Next.js Header Configuration Drift
Headers set on `/` do not always protect nested routes.
阅读聚焦 →
Open Redirect
Your /redirect?url=… that doesn't validate the destination is a phishing kit.
阅读聚焦 →
07 / 07
源代码
Ghost Content API SQL Injection Advisory
A vulnerable Ghost dependency can put public content APIs on the database boundary.
阅读聚焦 →
LibreNMS Command Injection Advisory
A vulnerable monitoring stack can become an execution path inside the network.
阅读聚焦 →
LiteLLM SQL Injection Advisory
A vulnerable LiteLLM Proxy version can turn API-key verification into database exposure.
阅读聚焦 →
Committed AI-Generated Secrets
AI snippets should not ship provider keys into git.
阅读聚焦 →
electerm Install-Script Command Injection Advisory
A vulnerable terminal-client dependency can put build or developer hosts at install-time risk.
阅读聚焦 →
OpenCms XXE Information-Disclosure Advisory
A vulnerable OpenCms dependency can put XML-processing routes on a file-read boundary.
阅读聚焦 →
PDF.js JavaScript Execution Advisory
A vulnerable PDF viewer can turn a malicious document into script execution.
阅读聚焦 →
Risky Source-Code Patterns
eval(), dangerouslySetInnerHTML, hard-coded secrets — the patterns SAST has been catching for 25 years.
阅读聚焦 →
Supabase RLS in Migrations
A public table without RLS is a future data leak.
阅读聚焦 →
Vulnerable Dependencies
Your package-lock.json includes thousands of packages. Some have known CVEs.
阅读聚焦 →
Webhook Signature Verification
If your webhook handler doesn't verify the signature, anyone can forge events.
阅读聚焦 →
AI-Generated Code Guardrails
Fast AI-assisted changes need repo-level security rails.
阅读聚焦 →
Repo Security Hygiene
Branch protection, action pinning, secret hygiene — how your repo is run matters more than the code.
阅读聚焦 →
Reviewing repo code against web app risk patterns
Reviewing repo code against web app risk patterns
阅读聚焦 →
