Every organization is unique in their tech stack composition. You need to detect and remediate a whole range of vulnerabilities that are not just limited to publicly known attacks.

Our Cloud platform can automate scanning for almost any kind of vulnerability, including those you know about internally, across your environments.

Review this use case to walk through an example to create a template for custom automation.

Custom automation

Imagine your penetration testing team found a critical vulnerability on Now, you want to inspect to look for this vulnerability on your other instances or ensure it does not reappear in the future on the same app:


SQL Injection vulnerability in This vulnerability can potentially allow an attacker to bypass our authorization system and gain access to any given user account. This is a very critical vulnerability that needs to be patched.

HTTP Request:

POST /login HTTP/1.1
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded

username=admin&password=' OR '1'='1

HTTP Response:

HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 1337
Server: Apache

<p>Welcome back, admin</p>

The application improperly handles user input in the password field, leading to an SQL Injection vulnerability.

Create a Custom Template

Follow the steps below to build a custom template and automation.


Open Templates

Navigate to and select Start with AI to open the workflow.


Add your template

Paste your template and click Generate to build a new custom template.

  • This will take a moment to create a new template.
  • Use the example above to test this functionality out.

Revise your template

Our template language is easy and versatile, allowing you to write nearly any type of vulnerability test.

  • To make additional edits check out our templates doc to learn more.

Build a new Scan

Navigate to and select Create New Scan to open the workflow to create a new scan using the template you just created.

What’s Next?

This workflow can quickly turn your internal vulnerability knowledge into continuous scans.

Monitor across your tech stack to see its match and re-appearance after the fix. This approach helps identify similar matches and reappearances after implementing fixes.

Through these customizations you can easily build a security monitoring system that expands upon the expertise and data of your security teams.