8 Free Rules + 10 Pro Rules.
Free tier: 8 security rules (AP001–AP008) + Multi-language & framework support. Pro: Advanced OWASP op 10 rules + 30+ secrets detection patterns (AP201) .
Free vs Pro Comparison
Choose the edition that fits your security needs
| Feature | Free | Pro |
|---|---|---|
| 8 Authorization Rules (AP001-AP008) | ✓ | ✓ |
| OWASP Top 10 Rules (AP101-AP108) | — | ✓ |
| Secrets Detection (AP201) | — | ✓ |
| Deep Source Code Analysis | — | ✓ |
| File-Level Scanning | — | ✓ |
| Diff Mode | — | ✓ |
| Historical Tracking | — | ✓ |
| Risk Scoring | — | ✓ |
| 100% Local Analysis | ✓ | ✓ |
| CI/CD Integration | ✓ | ✓ |
| Price | $0 | $12/mo |
Advanced OWASP Top 10 + Secrets Detection
Pro tier adds deep source code inspection beyond endpoint metadata. Detects SQL injection, XSS, weak crypto, secrets, and more.
Upgrade to Pro - $12/monthAP101
Broken Access Control
Missing [Authorize], database writes without auth, IDOR without ownership checks
AP102
Cryptographic Failures
Weak hashing (MD5/SHA1), hardcoded crypto keys, sensitive data logging
AP103
Injection Vulnerabilities
SQL injection, XSS in Razor, insecure deserialization, Process.Start
AP104
Insecure Design
Missing CSRF tokens, missing ModelState validation, missing rate limiting
AP105
Security Misconfiguration
XXE vulnerabilities, permissive CORS, missing HTTPS/HSTS, debug endpoints
AP106
Vulnerable Components
Legacy API patterns, deprecated frameworks, outdated endpoints
AP107
Authentication Failures
Missing audit logging on DELETE, plaintext password comparison
AP108
SSRF Vulnerabilities
HttpClient/WebClient with user input, URI construction from variables
AP201
Secrets in Code
Detects 30+ secret patterns: AWS, Azure, GCP keys, GitHub tokens, database credentials, JWT secrets
🔒 100% Local Analysis - Your code never leaves your machine
8 Authorization Rules
Purpose-built for API authorization patterns. Zero false positives.
AP001: Unintentional Public Access
Detects endpoints that are accessible without authentication but lack an explicit [AllowAnonymous] attribute.
This forces developers to make intentional decisions about public access. Every public endpoint should have explicit documentation of its intent.
AP002: Anonymous Write Operations
Catches [AllowAnonymous] on POST, PUT, DELETE, and PATCH operations.
Anonymous write access is almost never intentional. This rule prevents accidental exposure of data modification endpoints.
AP003: Authorization Conflicts
Detects when action-level [AllowAnonymous] overrides controller-level [Authorize].
This pattern often indicates copy-paste errors or incomplete refactoring. It creates security holes in otherwise protected controllers.
AP004: Missing Auth on Writes
The most critical rule: public write operations without any authorization attributes. This is your last line of defense.
Write operations (POST, PUT, DELETE, PATCH) should always have explicit authorization. No exceptions.
AP005: Role Sprawl
Flags endpoints with 3 or more roles assigned. This is a code smell indicating that policy-based authorization might be a better fit.
Excessive role requirements make code harder to maintain and reason about. Consider consolidating into policies.
AP006: Weak Role Names
Detects generic roles like "User", "Admin", "Guest", and "Manager". These names don't convey specific permissions.
Descriptive role names like "OrderManager" or "ReportViewer" make authorization logic self-documenting.
AP007: Sensitive Routes Exposed
Flags public routes containing sensitive keywords like /admin, /debug, /export, /config.
The keyword list is customizable via configuration. Add your own patterns to match your application's conventions.
AP008: Minimal API Gaps
Detects Minimal API endpoints missing .RequireAuthorization() method chains.
Full support for modern .NET patterns including route groups and endpoint filters.
Ready to secure your API?
Start with the free tier or upgrade to Pro for OWASP Top 10 + secrets detection.