Core Security Rules
Configure active heuristics for real-time engine analysis.
Detect Obfuscated Code
Identifies packed or encoded payloads (b64-decode, etc.)
Flag Remote File Inclusion
Monitors dynamic include calls using user-controlled paths.
Scan JS / TS Files
Deep inspection of client-side logic for vulnerabilities.
Heuristic SQLi Detection
Pattern matching for potential SQL injection vectors.
Detect Dynamic Evaluation
Flags dynamic code execution patterns.
Detect Shell Execution
Flags system and passthru similar calls.
Detect Hardcoded Credentials
Finds passwords, API keys, and tokens embedded in code.
SSRF Detection
Detects server-side request forgery patterns.
Custom YARA Rules
Upload proprietary detection logic for custom threats.
Drop .yar files here or click to upload
Supports multi-rule syntax.
Active Custom Rules (2)
tuneScanning Sensitivity
Caution: High Sensitivity
Extreme levels may increase false positives. Recommended for critical production environments only.
Rule Coverage
Your active rule configuration covers 98.4% of known CVEs in the current threat landscape.