Help center
  • English
Go to website
Back
Articles on:Reports & results
No description

Categories

  • Authenticated testing
  • Single Sign-On (SSO)
  • Account
  • Integrations
  • Cosmog configuration
  • Pricing & payment
  • Team access
  • Reports & results
  • API security testing
  • Domain verification
  • General
  • Why is my test report shown as "not approved"?
    We use a supervised learning system and have multiple levels of result verification. So, in the initial stages, we will check for the quality of the system to understand the efficiency and what needs improvement.  Users on the free plan get a report that shows "not approved" since it has not gone through this verification process. The final level of verification is from our team of security engineers and they sign for the report (if the need arises). This option is only available on a paid plan.Few readers
  • How to download HIPAA, PCI DSS, OWASP compliance reports on Beagle Security?
    Beagle Security automatically maps your test results to various compliance standards, including OWASP, OWASP Top 10, ISO 27001, CWE, CAPEC, HIPAA and PCI DSS.  Once a test is completed, you can download the corresponding compliance reports directly from the application dashboard to assess how well your application aligns with these regulatory requirements.  How to download and view test reports on Beagle Security Go to the Applications section and click on the specific application NavigateFew readers
  • How can I share my test report?
    You can download the test results in PDF, JSON, CSV or XML format and share it with your teammates or clients. Beagle Security can also be integrated with tools like Jira, Asana, Trello and Azure Boards to receive the results once the test has been completed successfully. We would like to remind you to be extremely careful about who you share the test results with since it contains very sensitive information.Few readers
  • Out of Band vulnerability detection on Beagle Security
    What is an Out-of-Band (OOB) vulnerability? Out-of-Band vulnerabilities are vulnerabilities that cannot be found in a traditional penetration testing methodology (HTTP request-response). Mostly found in web applications, APIs, and backend programs, this vulnerability has a distinct working process. How does a hacker exploit an Out-of-Band vulnerability? A payload is crafted to send a specific request to the bad actor’s machine.  It is then uploaded to the target service/applicaFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025 Help centerWe run on Crisp Knowledge.