Vulnerability Scanning
What it does
Automated vulnerability scanning runs continuously on POTAL infrastructure, dependencies, and application code. Scans cover OWASP Top 10, CVE databases, and dependency supply chain risks. Results are triaged and patched promptly.
How to use it
Review security posture
Enterprise customers can request the latest vulnerability scan report from their account manager.
Check dependency status
POTAL's open-source dependencies are monitored for known vulnerabilities via automated tooling.
Report findings
If you discover a vulnerability, report it via the responsible disclosure process.
Request SOC 2 report
Enterprise customers can request SOC 2 Type II compliance documentation.
Related Features
CSP, HSTS, X-Frame-Options, and OWASP-compliant headers
Regular security assessments with documented test results
AES-256 encryption at rest and TLS 1.3 in transit
Automated escalation flow with Telegram alerts for incidents
Granular API key scopes with row-level security enforcement