Vulnerability Patterns
252+ curated security patterns across 5 languages. Each pattern includes detection rules, code examples, and remediation guidance.
Overview
Bloodhound's pattern library is the foundation of its vulnerability detection. Patterns are continuously updated based on new CVEs, security research, and real-world exploits.
252+
Total Patterns
5
Languages
Weekly
Updates
Language Support
Click on a language to view its complete pattern library with code examples.
Vulnerability Categories
Patterns are organized by OWASP categories and CWE mappings.
| Category | Patterns | Severity | Examples |
|---|---|---|---|
| Injection | 340 | critical | SQLCommandLDAPXPath |
| Broken Authentication | 180 | critical | Weak PasswordSession FixationJWT Flaws |
| Sensitive Data Exposure | 290 | high | PII LeakageHardcoded SecretsDebug Info |
| XXE | 45 | high | XML ParserSOAPSVG Processing |
| Broken Access Control | 210 | critical | IDORPrivilege EscalationPath Traversal |
| Security Misconfiguration | 410 | medium | CORSCSPDebug Mode |
| XSS | 185 | high | ReflectedStoredDOM-based |
| Insecure Deserialization | 75 | critical | PickleYAMLJSON |
| Vulnerable Components | 320 | varies | CVEsOutdated DepsLicense Issues |
| Insufficient Logging | 95 | low | Missing AuditSensitive Logging |
Custom Patterns
Create organization-specific patterns to enforce internal security standards.
Enterprise Feature
Custom pattern creation is available on Pro and Enterprise plans. Contact sales for more information.