CodeWallDocs
Tests

Test Types

Understand the different types of penetration tests CodeWall can perform.

When creating a new test, you choose the type of test you want to run. Each test type is designed for different objectives and levels of access.

Available test types

TypeDescriptionAccess LevelBest For
Surface DiscoveryMaps your external attack surface from a domain or company nameNo access neededUnderstanding what's exposed
Full BlackboxTests a target with no prior knowledgeNo credentialsSimulating an external attacker
Scoped BlackboxTests multiple specific targets (domains, URLs, IPs, endpoints)No credentialsFocused testing of specific assets
Authenticated (Gray Box)Tests with provided credentials to access authenticated areasCredentials providedDeep testing behind login walls
MCP Server SecurityTests MCP servers for injection and access control vulnerabilitiesServer accessAI tool integrations, agent pipelines
LLM App / ChatbotTests LLM-powered apps for prompt injection and guardrail bypassesAPI accessChatbots, AI assistants, LLM wrappers

Coming soon

TypeDescription
Infrastructure TestScan cloud environments for misconfigurations, open firewall rules, exposed storage buckets, and IAM policy weaknesses across AWS, Azure, and GCP
Internal TestDeploy a CodeWall sensor inside your network to continuously test internal systems and services
Code TestIntegrate into your CI/CD pipeline to analyse code for security vulnerabilities on every commit
Mobile AppTest iOS and Android apps for security vulnerabilities including authentication, API exposure, and local data storage issues

Surface Discovery

Discovers and maps your external attack surface starting from a domain or company name. The agent will:

  • Enumerate subdomains and related domains
  • Identify exposed services and open ports
  • Fingerprint technologies and software versions
  • Map the discovered assets into your asset inventory

Use this as a starting point to understand what's publicly visible before running deeper tests.

Full Blackbox

Simulates an external attacker with no prior knowledge. Provide a single domain and CodeWall will:

  • Crawl and map the application
  • Test for vulnerabilities without any credentials
  • Focus on externally exploitable issues
  • Identify misconfigurations and information disclosure

Scoped Blackbox

Like Full Blackbox, but you define multiple specific targets rather than a single domain. Provide a list of:

  • Domains
  • URLs
  • IP addresses
  • Specific endpoints

You can also explicitly exclude targets to keep certain assets out of scope.

Authenticated (Gray Box)

The deepest test type. Provide authentication credentials so CodeWall can test behind login walls:

  • Bearer token — provide an API token or JWT
  • Basic auth — provide username and password
  • Custom headers — define arbitrary headers for non-standard auth

See Define Authentication for setup details.

MCP Server Security

Tests a Model Context Protocol server for security vulnerabilities in its exposed tools. Provide:

  • SSE transport — the server's SSE endpoint URL
  • stdio transport — a shell command to start the server, plus any environment variables

CodeWall will enumerate all available tools, analyse their schemas, and test each tool's parameters for injection vulnerabilities including SQL injection, command injection, path traversal, and SSRF.

LLM App / Chatbot

Tests an LLM-powered application for prompt injection and other LLM-specific vulnerabilities. Provide:

  • The application's API endpoint URL
  • The request format (OpenAI-compatible, Anthropic Messages API, or custom)
  • Optionally, a known system prompt for measuring extraction completeness

CodeWall will test for direct and indirect prompt injection, system prompt extraction, data exfiltration, and guardrail bypasses.