SpectraD+ 67/100

SPECTRA

> analyzing express
the full spectrum of your codebase
Architecture 68 C-
Security 53 F
Quality 65 D+
Documentation 68 C-
Maintainability 83 B+
Performance 82 B
Your codebase scores D+ (67/100) — strong maintainability with security gaps

Top Strengths

Maintainability B+ (83)
Performance B (82)
Documentation C- (69)

Key Concerns

Security F (53)
Quality D+ (66)
Architecture C- (68)
Severity Distribution
high (6) medium (27) low (24) info (6)
63 findings · 6 agents · 128s · ~78h tech debt
  1. 01> high Error handler registered before 404 handler in MVC example examples/mvc/index.js:76

    Swap the order: place the 404 catch-all middleware before the error-handling middleware so that errors from the 404 handler are caught by the error handler.

  2. 02> high Hardcoded session secret in auth example examples/auth/index.js:22

    Load the session secret from an environment variable (e.g., process.env.SESSION_SECRET) and fail startup if it is not set. Add a comment in the example explicitly warning against using hardcoded secrets in production.

  3. 03> high Reflected XSS via session messages constructed from user input examples/auth/index.js:36

    Use a template engine's auto-escaping or explicitly escape values with a library like `escape-html` before embedding in HTML strings. Replace string concatenation with template rendering that auto-escapes.

  4. 04> high XSS vulnerability via unsanitized session data rendered as HTML examples/auth/index.js:33

    Use a template engine's auto-escaping or explicitly escape HTML entities using `escape-html` or similar before embedding in HTML strings. Replace raw string concatenation with `escapeHtml()` calls.

  5. 05> high Open redirect vulnerability via unvalidated Referrer header examples/auth/index.js:109

    Validate that the Referrer URL is a relative path or belongs to the same origin before using it as a redirect target. Use a whitelist approach or parse the URL and check the hostname.

D+ 0 / 100
Industry median: 62 · Above industry median for Javascript projects D grades signal significant technical debt requiring attention
Architecture68
Security53
Quality66
Documentation69
Maintainability83
Performance82
Architecture
0 C-
Security
0 F
Quality
0 D+
Documentation
0 C-
Maintainability
0 B+
Performance
0 B
0
Findings
0
Critical
0
Duration
$0
Cost
0
Agents
6
Agents
83K
Tokens Used
2m 8s
Duration
$2.63
API Cost
0
Hallucinations Removed
Agents Used
Architecture Security Quality Documentation Dependency Performance
Filter

Architecture (9)

estimated effort: ~18h

Security (14)

estimated effort: ~14h

Quality (11)

estimated effort: ~15h

Documentation (11)

estimated effort: ~16h

Maintainability (7)

estimated effort: ~7h

Performance (9)

estimated effort: ~10h
0 estimated hours to remediate
cost to remediate: ~$13,738 at $150/hr avg dev rate
By Dimension
Architecture 17.5h
Documentation 15.5h
Quality 15.0h
Security 13.5h
Performance 10.0h
Maintainability 7.0h
By Severity
high 13.5h
medium 39.0h
low 23.0h
info 3.0h
Debt Distribution
high
medi
low
OWASP Top 10 (2021) Coverage
6 of 10 categories checked
A01:2021 Broken Access Control
A02:2021 Cryptographic Failures
A03:2021 Injection
A04:2021 Insecure Design
A05:2021 Security Misconfiguration
A06:2021 Vulnerable and Outdated Components
A07:2021 Identification and Auth Failures
A08:2021 Software and Data Integrity Failures
A09:2021 Security Logging and Monitoring Failures
A10:2021 Server-Side Request Forgery
OWASP Top 10 (2025) Coverage
6 of 10 categories checked
A01:2025 Broken Access Control
A02:2025 Security Misconfiguration
A03:2025 Software Supply Chain Failures
A04:2025 Cryptographic Failures
A05:2025 Injection
A06:2025 Insecure Design
A07:2025 Authentication Failures
A08:2025 Software or Data Integrity Failures
A09:2025 Logging and Alerting Failures
A10:2025 Mishandling of Exceptional Conditions
CWE References Found
CWE-79 CWE-209 CWE-352 CWE-532 CWE-601 CWE-614 CWE-798 CWE-915

AI-assisted screening based on finding text. Not a substitute for professional penetration testing.

Automated heuristic — not a substitute for formal due diligence or financial advisory. Score is derived from code-quality signals, not business fundamentals.
0 / 100
needs work

Moderate technical risk. Several areas need attention before fundraising.

Component Breakdown
Overall Score
67 25%
Security Posture
53 20%
Issue Concentration
48 10%
Dependency Health
0 10%
Code Complexity
50 10%
License Compliance
95 10%
SOC 2 Readiness
39 10%
Critical Findings
100 5%

AI-estimated composite score. Consult qualified advisors for investment decisions.

Automated heuristic — not a substitute for formal SOC 2 assessment. Findings are mapped by keyword analysis, not control evidence evaluation.
39.4% control coverage
13 of 33 controls addressed
20 gaps · 41 findings mapped
CC1: Control Environment 0/5
CC1.1 Integrity and ethical values
CC1.2 Board independence and oversight
CC1.3 Management structure and reporting
CC1.4 Commitment to competence
CC1.5 Accountability for internal controls
CC2: Communication and Information 1/3
CC2.1 Information for internal control 5
CC2.2 Internal communication of objectives
CC2.3 External communication
CC3: Risk Assessment 3/4
CC3.1 Specification of suitable objectives 3
CC3.2 Risk identification and analysis 3
CC3.3 Consideration of fraud risk 7
CC3.4 Identification of significant changes
CC4: Monitoring Activities 1/2
CC4.1 Ongoing and separate evaluations 1
CC4.2 Communication of deficiencies
CC5: Control Activities 2/3
CC5.1 Selection of control activities 1
CC5.2 Technology general controls
CC5.3 Deployment through policies 4
CC6: Logical and Physical Access Controls 4/8
CC6.1 Logical access security software 8
CC6.2 Credential and secret management 8
CC6.3 Role-based access authorization
CC6.4 Access removal and session management 8
CC6.5 Physical access restrictions
CC6.6 System boundary protection
CC6.7 Data transmission security 1
CC6.8 Prevention of unauthorized software
CC7: System Operations 1/5
CC7.1 Infrastructure and availability monitoring 1
CC7.2 Security event detection
CC7.3 Security event evaluation
CC7.4 Incident response procedures
CC7.5 Recovery and resilience
CC8: Change Management 0/1
CC8.1 Change control processes
CC9: Risk Mitigation 1/2
CC9.1 Risk mitigation for business disruptions
CC9.2 Third-party and vendor risk management 7

Keyword-based mapping to AICPA Common Criteria (CC1–CC9). Not a formal SOC 2 audit.

Automated heuristic — not a substitute for formal PCI DSS assessment. Findings are mapped by keyword analysis, not control evidence evaluation.
63.6% control coverage
7 of 11 controls addressed
4 gaps · 29 findings mapped
R6.2: Secure Software Development 1/4
6.2.1 Secure development processes defined
6.2.2 Software development personnel trained
6.2.3 Code reviewed before release
6.2.4 Protection against common vulnerabilities 15
R6.3: Security Vulnerabilities Identified and Addressed 3/3
6.3.1 Known vulnerabilities identified 2
6.3.2 Software inventory maintained 7
6.3.3 Patches applied timely 2
R6.4: Public-Facing Web Applications Protected 1/2
6.4.1 Web application firewall or equivalent
6.4.2 Automated attack detection 1
R6.5: Changes Managed Securely 2/2
6.5.1 Change control procedures 3
6.5.2 Development/test/production separation 3

Keyword-based mapping to PCI DSS 4.0 Requirement 6 (Secure Systems & Software). Not a formal PCI assessment.

Automated heuristic — not a substitute for formal NIST CSF assessment. Findings are mapped by keyword analysis, not control evidence evaluation.
50.0% function coverage
6 of 12 categories addressed
6 gaps · 25 findings mapped
GV: Govern 0/2
GV.OC-01 Organizational context understood
GV.RM-01 Risk management objectives established
ID: Identify 2/2
ID.AM-01 Asset inventory maintained 8
ID.RA-01 Risk assessment performed 2
PR: Protect 3/3
PR.AA-01 Access control enforced 9
PR.DS-01 Data security ensured 8
PR.PS-01 Platform security maintained 4
DE: Detect 1/2
DE.CM-01 Continuous monitoring implemented 2
DE.AE-01 Adverse event analysis performed
RS: Respond 0/2
RS.AN-01 Incident analysis conducted
RS.MI-01 Incident mitigation applied
RC: Recover 0/1
RC.RP-01 Recovery execution planned and tested

Keyword-based mapping to NIST Cybersecurity Framework 2.0 (6 Functions). Not a formal NIST assessment.

0
distribution score
concerning
0.516
Gini Coefficient
22
Unique Files
63
Total Issues
Top 10 Hotspot Files

Measures finding distribution across files. For contributor-based bus factor analysis, use git blame tools.

0 risk
critical risk
8 dependency findings analyzed · +10 severity penalty
Risk Signals Detected
2 unique licenses detected · 18 total mentions
MIT×11 ISC×7
0
Max Complexity
0.0
Avg Complexity
0
High Complexity Files
unknown risk
No high complexity files detected
This analysis cost
$2.63
Manual equivalent ($175/hr × 4h)
$700
Spectra saved you
$697 (100%)
Cost per finding
$0.04

Based on $175/hr senior engineer rate and ~4 hours for equivalent manual review. Actual costs vary.