Our Roadmap

What we've built, what we're building, and where we're headed.

Shipped
Shipped
Scanning

Deep Scanning Engine

Automated analysis across your external attack surface: subdomain discovery, port scanning, vulnerability detection, SSL/TLS checks, security headers, web tech profiling, JS dependency scanning, and WAF detection.

AI

AI-Powered Fix Suggestions

Every finding comes with plain-English remediation: what's wrong, why it matters, and exactly how to fix it.

Insights

Security Score & Trends

One number that tells you where you stand. Track improvements over time and show progress to stakeholders.

Dashboard

Full Dashboard & Reports

Asset management, scan history with side-by-side comparison, and detailed reports that make sense to non-security people.

Trust

Security Certificates

Shareable security certificates that answer procurement questions in one link. Send proof, not promises.

Billing

Annual Billing & Plan Limits

Save with annual plans. Asset limits and scan frequency tiers that give Pro users more control.

Now
In Progress
Scanning

Email Security Scanner

SPF, DKIM, and DMARC checks for your domains. Catch email spoofing risks before attackers do.

Scanning

On-Demand Scanning

Trigger a scan manually at any time. Verify a fix immediately, respond to a change in your environment, or rescan before sharing your certificate.

Content

Knowledge Base

Security guidance for every finding type. Business impact and technical remediation in one place.

Outreach

Shareable Security Reports

Receive a security report about your company? Claim your profile and start monitoring for free.

Insights

Business Impact Descriptions

Every finding now explains the real-world business impact — why it matters for procurement, compliance, and customer trust.

Compliance

OWASP Top 10 Mapping

Findings mapped to OWASP Top 10 categories with exploitability signals. See which industry standards each issue relates to.

Next
Next
Scanning

Subdomain Takeover Detection

Detect dangling DNS records that could let attackers hijack your subdomains on AWS, Azure, GitHub Pages, and more.

Compliance

NIS2 Technical Gap Assessment

See which NIS2 technical requirements your scans already cover and where the gaps are. One page, no jargon, ready to share with management.

Scanning

WordPress & CMS Plugin Detection

Detect known vulnerabilities in WordPress plugins, themes, and CMS installations — the most common attack surface for SME websites.

Integrations

Slack & Teams Alerts

Get security updates where your team already works. No more checking dashboards manually.

Integrations

Jira & Linear Issue Sync

Push critical findings directly to your project tracker as actionable issues. No copy-pasting, no lost tickets.

Exploring
Exploring
Scanning

Authenticated App Checks

Test logged-in areas with scoped test credentials. Detect broken auth flows, exposed admin paths, weak session controls, and common API issues that unauthenticated scans cannot reach.

Scanning

API Security Scanning

Scan customer-provided OpenAPI or Swagger specs with scoped credentials. Check for exposed documentation, weak auth, common API misconfigurations, and high-signal OWASP API risks.

Scanning

API Exposure Detection

Detect publicly accessible API documentation, debug endpoints, and CORS misconfigurations before attackers find them.

Compliance

Cyber Insurance Evidence Pack

Pre-packaged security evidence formatted for cyber insurance applications. Show underwriters your posture and potentially lower your premiums.

Insights

Industry Benchmarking

See how your security score compares to similar companies in your sector. Know if you are ahead or behind without hiring a consultant.

Billing

Business Tier

Multi-user access, priority scanning, extended history, and team reporting for growing companies with a small security-aware team.