Vulnerability Patterns

252+ curated security patterns across 5 languages. Each pattern includes detection rules, code examples, and remediation guidance.

Overview

Bloodhound's pattern library is the foundation of its vulnerability detection. Patterns are continuously updated based on new CVEs, security research, and real-world exploits.

252+
Total Patterns
5
Languages
Weekly
Updates

Language Support

Click on a language to view its complete pattern library with code examples.

Vulnerability Categories

Patterns are organized by OWASP categories and CWE mappings.

CategoryPatternsSeverityExamples
Injection340critical
SQLCommandLDAPXPath
Broken Authentication180critical
Weak PasswordSession FixationJWT Flaws
Sensitive Data Exposure290high
PII LeakageHardcoded SecretsDebug Info
XXE45high
XML ParserSOAPSVG Processing
Broken Access Control210critical
IDORPrivilege EscalationPath Traversal
Security Misconfiguration410medium
CORSCSPDebug Mode
XSS185high
ReflectedStoredDOM-based
Insecure Deserialization75critical
PickleYAMLJSON
Vulnerable Components320varies
CVEsOutdated DepsLicense Issues
Insufficient Logging95low
Missing AuditSensitive Logging

Custom Patterns

Create organization-specific patterns to enforce internal security standards.

Enterprise Feature

Custom pattern creation is available on Pro and Enterprise plans. Contact sales for more information.