Understanding Reports
Learn how to interpret CortexEDR security reports, understand severity levels, and take actionable steps to improve your codebase security.
Report Structure
Executive Summary
- • Overall security score (0-100)
- • Total issues found
- • Critical/high priority items
- • Risk assessment level
Agent Breakdown
🛡️
Security Scanner
Vulnerabilities & exploits
🏗️
Architecture
Design patterns & structure
💻
Code Quality
Best practices & standards
📊
Technical Debt
Maintenance & complexity
Severity Classification
🚨
Critical
Priority 1Immediate security threats requiring urgent attention
SQL InjectionRemote Code ExecutionAuthentication Bypass
⚠️
High
Priority 2Significant security risks that should be addressed promptly
Cross-Site ScriptingInsecure DependenciesWeak Cryptography
⚡
Medium
Priority 3Moderate security concerns that should be reviewed
Information DisclosureWeak ConfigurationsDeprecated APIs
ℹ️
Low
Priority 4Minor security improvements and best practice violations
Code Quality IssuesPerformance SuggestionsDocumentation Gaps
Reading Issue Details
Issue Anatomy
Title
Clear, actionable description
Severity
Critical → Low scale
File & Line
Exact location in codebase
CWE ID
Common Weakness Enumeration
Description
What the issue is and why it matters
Exploit Scenario
How an attacker could leverage this vulnerability
Fix Recommendation
Specific steps to resolve the issue
Taking Action
Prioritization Strategy
- Address all Critical issues immediately
- Review High priority items within 1 week
- Plan Medium issues for next sprint
- Consider Low priority items for technical debt cleanup
Common Patterns
Many vulnerabilities share root causes. Fixing one pattern often resolves multiple issues:
Example: Input Validation
Fixing input validation in one place prevents SQL injection, XSS, and command injection across your entire application.
Continuous Improvement
- Set up automated scanning in CI/CD pipelines
- Establish security review processes for code changes
- Create security champions in development teams
- Regular security training and awareness programs
Critical Priority
These issues pose immediate security threats and should be addressed within 24 hours.
• Remote Code Execution
• SQL Injection
• Authentication Bypass
Score Interpretation
90-100:Excellent security posture
70-89:Good with room for improvement
50-69:Needs attention
0-49:Critical security review required
Export Options
📄 PDF Report
📊 JSON Export
🔗 Shareable Link
📧 Email Summary
