Back to Features
🔒

Vulnerability Scanning

ActiveSecurityMUSTFREE

What it does

Automated vulnerability scanning runs continuously on POTAL infrastructure, dependencies, and application code. Scans cover OWASP Top 10, CVE databases, and dependency supply chain risks. Results are triaged and patched promptly.

How to use it

1

Review security posture

Enterprise customers can request the latest vulnerability scan report from their account manager.

2

Check dependency status

POTAL's open-source dependencies are monitored for known vulnerabilities via automated tooling.

3

Report findings

If you discover a vulnerability, report it via the responsible disclosure process.

4

Request SOC 2 report

Enterprise customers can request SOC 2 Type II compliance documentation.

Related Features

Having issues?