VEXLIT
Pricing
Community
Log in

Documentation

Getting StartedCLI ReferenceConfigurationCI/CD IntegrationAPI ReferenceFAQ & Troubleshooting

Core Features

Rules CatalogTaint AnalysisSCA (Dependencies)Secret DetectionDAST Scanning

Tutorials

First ScanFix VulnerabilitiesGitHub ActionTeam Workflow

Security Learn

OverviewOWASP Top 10SQL InjectionXSS

Security Knowledge Base

Learn about common vulnerabilities, how they work, and how to prevent them. Each guide includes real code examples and detection strategies.

OWASP Top 10

OWASP Top 10 (2021)

The most critical web application security risks, with real examples and VEXLIT detection coverage.

Read more
CWE-89

SQL Injection

How SQL injection works, real-world examples, and how to write secure parameterized queries.

Read more
CWE-79

Cross-Site Scripting (XSS)

Understanding XSS attack vectors, output encoding, and Content Security Policy.

Read more

Ready to secure your code?

Detect vulnerabilities across 34 languages with VEXLIT.

Start ScanningView CLI Docs
VEXLIT - AI-Powered Security Scanner
DocsHome