Passive web security scanning with actionable 30/60/90-day remediation plans. Integrates into GitHub Actions, GitLab CI, and Bitbucket Pipelines. Mapped to SOC 2, ISO 27001, NIST, GDPR.
No subscriptions. Every paid scan includes a full remediation plan and downloadable PDF report.
Free preview shows your score. Unlock the full remediation plan + PDF for €4.99.
🔒 Passive scan only — zero intrusion, zero risk. See pricing
Add security scanning to every deploy. Set score thresholds to gate releases. Fail pipelines before insecure code hits production.
Add to any workflow. Runs on push, PR, or schedule. Fails the job if score drops below your threshold.
Integrates as a pipeline stage. Gate merge requests with a minimum compliance score.
Run on every deployment. Block promotions to production when compliance drops.
Set HACKOPLAB_API as a secret in your CI/CD platform pointing to your privacy-scanner Worker URL. Adjust the threshold score to match your risk appetite.
Comprehensive passive analysis with actionable remediation — all without touching your infrastructure.
Certificate validation, protocol checks, HSTS enforcement. Remediation: exact header config to add.
Policy presence, DSAR links, DPO contact. Remediation: template sections to add per GDPR Art. 13.
CMP detection (OneTrust, Cookiebot), opt-in flows. Remediation: implementation steps with code snippets.
CSP, HSTS, X-Frame-Options, Referrer-Policy. Remediation: exact header values to deploy, per server type.
Weighted scoring mapped to SOC 2, ISO 27001, NIST CSF. Remediation: prioritised by risk impact.
Phased remediation: Stabilise (30d), Harden (60d), Mature (90d). Each task has effort, owner, and evidence output.
Every finding maps to specific controls. Audit-ready, control-by-control.
CC6, CC7, CC8, Availability criteria mapping.
A.8, A.13, A.14 system security controls.
PR.DS, DE.CM, ID.RA sub-categories.
Art. 5, 12-22, 25, 32 compliance markers.
Right to Know, Right to Opt-Out verification.
Req 6 Secure Dev, TLS, app protections.
Boundary, config, patching, access control.
T1190, T1059, T1505.003 technique mapping.
Template-driven policy guidance aligned with compliance frameworks.
GDPR-compliant notice: collection, processing, retention, data subject rights.
GDPR Art. 13/14Scope, roles, acceptable use, access control, incident management.
ISO 27001 A.5ePrivacy/PECR disclosure, category breakdown, consent mechanisms.
ePrivacy DirectiveDetection, triage, containment, 72-hour GDPR breach notification.
NIST SP 800-61RBAC, least privilege, MFA, privileged access management.
SOC 2 CC6.1Retention schedules, lawful basis, secure disposal, audit evidence.
GDPR Art. 5(1)(e)