Detection Coverage Matrix

A comprehensive breakdown of the vulnerability classes, exposed secrets, and AI-specific anti-patterns detected by Erzo.

Secrets & Credentials

Detect hardcoded keys, tokens, and passwords that AI assistants frequently leave in source code or config files.

Detection PatternSeverityIncluded In Plan
Supabase Service Role KeyCriticalFree
AWS IAM Access KeysCriticalFree
Stripe Secret/Restricted KeysCriticalFree
GitHub Personal Access TokensHighFree
OpenAI/Anthropic API KeysHighFree
Database Connection Strings with PasswordsCriticalFree

Insecure AI Patterns

Catch security anti-patterns specifically generated by tools like v0, Cursor, and Copilot during rapid prototyping.

Detection PatternSeverityIncluded In Plan
Missing Row Level Security (RLS)CriticalFree
Bypass Authentication via Client-side ChecksHighPro
Prompt Injection SusceptibilityHighPro
Excessive Agentic Agency (Unbounded Tool Use)CriticalTeam
Insecure Direct Object Reference (IDOR) in Next.js Server ActionsHighPro

Infrastructure Exposure

Identify misconfigured local or cloud infrastructure files that expose sensitive services to the public internet.

Detection PatternSeverityIncluded In Plan
Exposed Ollama API EndpointsHighPro
Unauthenticated Jupyter NotebooksCriticalPro
Default Credentials in docker-compose.ymlMediumPro
Wildcard CORS policies on internal APIsMediumPro

Dependency Vulnerabilities

Continuous checking against the OSV (Open Source Vulnerability) database for hallucinated or outdated packages.

Detection PatternSeverityIncluded In Plan
Known CVEs in package.jsonVariableFree
Malicious Package Detection (Typosquatting)HighPro
Hallucinated Non-Existent PackagesMediumFree

Don't let AI write vulnerable code.