Skip to main content

Understanding Your Scan Results

Learn how to read, interpret, and prioritize Kai’s vulnerability findings. Every finding comes with proof-of-concept code that demonstrates the security issue is real.

Results Overview

Accessing Results

After your scan completes:
  1. Go to the Scan Results panel in the Kai extension
  2. Select your completed execution from the Executions panel
  3. Results load automatically in the webview

Results Dashboard

The main results view shows:
  • Vulnerability Summary: Total findings by severity
  • Kanban Board: Workflow status of each finding
  • Analytics: Scan metrics and performance data
Scan results and exploits list in Kai

Understanding Severity Levels

Kai assigns severity based on exploitability, impact, and context. Unlike static analysis tools that rely on patterns, Kai’s severity comes from actually executing attacks.

🔴 Critical Severity

Definition: Immediate, high-impact security risks requiring urgent attention Common examples:
  • Remote code execution (RCE)
  • Authentication bypass allowing admin access
  • SQL injection with data extraction
  • Privilege escalation vulnerabilities
  • Financial logic that allows theft/manipulation
What it means: An attacker can cause severe damage with minimal effort Response: Fix immediately before any production deployment

🟠 High Severity

Definition: Significant vulnerabilities with clear attack paths and substantial impact Common examples:
  • Cross-site scripting (XSS) with session theft
  • Authorization bypasses accessing sensitive data
  • Insecure direct object references
  • Cryptographic vulnerabilities
  • Race conditions in critical paths
What it means: Attackers can cause significant harm, but may need specific conditions Response: Priority fix - address within days, not weeks

🟡 Medium Severity

Definition: Important security issues that should be addressed but don’t pose immediate critical risk Common examples:
  • Information disclosure vulnerabilities
  • Denial of service (DoS) attacks
  • Input validation bypasses
  • Weak access controls
  • Logic flaws with limited impact
What it means: Security weakness that could be part of a larger attack chain Response: Include in your next development cycle

🟢 Low Severity

Definition: Security improvements and best practices that strengthen overall security posture Common examples:
  • Missing security headers
  • Weak password requirements
  • Information leakage in error messages
  • Missing input sanitization
  • Insecure default configurations
What it means: Good security hygiene improvements Response: Address when convenient, include in regular maintenance

Anatomy of a Vulnerability Report

Each finding contains several sections designed to help you understand and fix the issue.
Detailed vulnerability report view

1. Vulnerability Summary

Title: Descriptive name of the vulnerability Severity Badge: Color-coded severity level File Location: Specific file and line numbers affected Category: Type of vulnerability (e.g., “Authentication Bypass”, “SQL Injection”)

2. Description & Impact

What’s Wrong: Plain-English explanation of the security flaw Attack Scenario: How an attacker would exploit this vulnerability Business Impact: What could happen to your application or users Technical Details: Code-level explanation of the issue Example:
What’s Wrong: The login function doesn’t properly validate user sessions, allowing attackers to bypass authentication. Attack Scenario: An attacker can modify their session token to access any user’s account without knowing their password. Business Impact: Complete compromise of user accounts, data theft, unauthorized transactions.

3. Proof of Concept (PoC)

This is what makes Kai unique - every vulnerability includes working exploit code. The Code: Complete, executable proof that demonstrates the vulnerability Syntax Highlighting: Easy-to-read formatted code Comments: Explanations of what each part does Test Results: Output showing the exploit succeeded Example PoC structure:
// 1. Setup: Create a normal user session
const userSession = await createUserSession('victim@example.com');

// 2. Attack: Modify session to target admin user
const adminSession = userSession.replace('user123', 'admin456');

// 3. Exploit: Use modified session to access admin functions
const adminData = await fetchAdminData(adminSession);

// 4. Verification: Confirm unauthorized access succeeded
assert(adminData.includes('confidential'));

4. Suggested Fix

The Solution: Specific code changes to address the vulnerability Unified Diff: Before/after comparison showing exact changes Explanation: Why this fix solves the security issue Testing Notes: How to verify the fix works Example fix:
- if (sessionToken) {
+ if (sessionToken && validateSessionSignature(sessionToken)) {
    const user = getUserFromToken(sessionToken);
+   if (user.id !== requestedUserId) {
+     throw new Error('Unauthorized access');
+   }
    return user;
  }

5. Remediation Guidance

Fix Priority: Recommended timeline for addressing this issue Prevention: How to avoid similar vulnerabilities in the future Testing: Steps to verify your fix is effective Related Issues: Links to similar findings in your codebase

Verification Status

Every finding shows its verification status:

✅ Verified

  • Exploit compiled successfully
  • Proof-of-concept executed and demonstrated the vulnerability
  • Impact confirmed through testing
  • Trust Level: High - this is definitely a real security issue

⚠️ Unverified

  • Potential vulnerability identified
  • Exploit code didn’t compile or execute successfully
  • May require specific conditions to reproduce
  • Trust Level: Medium - investigate further

Common Vulnerability Categories

Authentication & Authorization

  • Session management flaws
  • Password reset vulnerabilities
  • Access control bypasses
  • JWT token manipulation

Input Validation

  • SQL injection
  • Cross-site scripting (XSS)
  • Command injection
  • Path traversal

Business Logic

  • Race conditions
  • State management issues
  • Workflow bypasses
  • Economic logic flaws

Cryptography

  • Weak encryption algorithms
  • Insecure key management
  • Certificate validation bypass
  • Random number generation flaws

Configuration & Deployment

  • Default credentials
  • Exposed debug endpoints
  • Missing security headers
  • Insecure file permissions
Ready to learn how to track and resolve these vulnerabilities? Continue to Managing Vulnerabilities to master the Kanban workflow for security fixes.