Findings & Evidence
A finding is a confirmed vulnerability discovered during an audit. WithGiga’s defining principle: GigaOps only emits findings on confirmed compromise or exposure — not theoretical issues, not “potential” weaknesses, not unverified scanner output.Finding structure
Every finding includes:| Field | Description |
|---|---|
id | Unique identifier within the audit |
title | Plain-English summary |
description | Detailed explanation of what’s wrong and why it matters |
severity | Critical / High / Medium / Low / Informational |
category | Class of issue (e.g., auth_bypass, sqli, exposed_credential) |
evidence | Raw output proving the finding — shell session, request/response, dumped data |
recommendation | How to remediate |
screenshot | Visual capture at the moment of discovery |
discoveredAt | Timestamp |
Severity levels
| Severity | Score impact | Examples |
|---|---|---|
| Critical | −30 pts | Confirmed RCE, authentication bypass, exposed admin panel without auth, leaked production credentials |
| High | −15 pts | SQLi with data extraction, stored XSS, privilege escalation, exposed sensitive PII |
| Medium | −8 pts | Reflected XSS, IDOR with limited impact, CSRF on state-changing endpoints, weak TLS |
| Low | −3 pts | Information disclosure, missing security headers, verbose errors, version disclosure |
| Informational | 0 | Observed configuration choices, hardening opportunities, no impact |
Evidence
Evidence is what separates confirmed findings from scanner output. Every finding includes the raw artifact that proves the vulnerability exists.What evidence looks like
For an authentication bypass, evidence might be:Browsing findings
From the dashboard
- Per audit — open an audit to see all its findings, filterable by severity
- Across the workspace — the Findings view aggregates every finding across all audits in the workspace
- Across workspaces — the global findings page (top-level Findings) aggregates everything
From the API
Verifying remediation
To verify a finding is remediated:- Apply the fix
- Re-run an audit against the same target (typically Shallow is enough)
- Confirm the finding is no longer present
- Compare the asciinema recordings before/after for full transparency
Next steps
Reports & Recordings
PDF export and full session replay.
Security Score
How findings compose into a letter grade.