Interpreting Results
How to understand and act on CodeWall's penetration testing findings.
After a test completes, CodeWall produces findings categorized by type, severity, and confidence. This guide explains how to interpret them effectively.
Finding types
Validated findings
Vulnerabilities that CodeWall has confirmed are exploitable. Each includes:
- A complete attack chain with step-by-step reproduction
- Proof-of-concept exploit with request/response evidence
- CVSS score and CWE classification
- Remediation guidance
Action: These are real vulnerabilities. Prioritize remediation based on severity and business impact.
Informational findings
Potential security issues that the agent identified but could not fully exploit. These may include:
- Suspicious behavior that suggests a vulnerability but lacks conclusive proof
- Configuration weaknesses that don't directly lead to exploitation
- Information disclosure that could aid an attacker
Action: Review these to strengthen your security posture, but prioritize validated findings first.
Severity ratings
CodeWall uses CVSS (Common Vulnerability Scoring System) to rate severity:
| Severity | CVSS Range | Meaning |
|---|---|---|
| Critical | 9.0 – 10.0 | Immediate exploitation risk, full system compromise possible |
| High | 7.0 – 8.9 | Significant impact, relatively easy to exploit |
| Medium | 4.0 – 6.9 | Moderate impact or requires specific conditions |
| Low | 0.1 – 3.9 | Limited impact, difficult to exploit |
| Informational | N/A | Not directly exploitable, but worth noting |
CWE classification
Each finding is mapped to a CWE (Common Weakness Enumeration) identifier, providing a standardized taxonomy. Common CWEs you may see:
- CWE-79 — Cross-site Scripting (XSS)
- CWE-89 — SQL Injection
- CWE-287 — Improper Authentication
- CWE-639 — Authorization Bypass Through User-Controlled Key (IDOR)
- CWE-918 — Server-Side Request Forgery (SSRF)
- CWE-78 — OS Command Injection
Reading an attack chain
Each validated finding includes an attack chain showing exactly what the agent did:
- Discovery — how the vulnerable endpoint was found during reconnaissance
- Analysis — what indicated the endpoint might be vulnerable
- Exploitation — the exact requests, payloads, and responses that confirmed the vulnerability
- Impact — what an attacker could achieve (data access, privilege escalation, etc.)
Prioritizing remediation
Not all Critical findings are equal. Consider:
- Business context — a Critical SQLi on a public-facing login page is more urgent than one on an internal admin tool
- Exploitability — does it require authentication? Special conditions?
- Data exposure — what data is at risk?
- Blast radius — could this be chained with other findings for greater impact?
Handling false positives
If you believe a finding is incorrect:
- Review the proof-of-concept carefully — reproduce it manually to verify
- Mark it as False Positive in the findings dashboard with a note explaining why
- CodeWall learns from false positive feedback to improve future tests

