0x4m4/hexstrike-ai
- 6 May 2026
- 1,284,902
- 11
What we found, by category.
Cross-site scripting in HTML output
SQL injection through unsanitised query construction
Path traversal in file system access
Server-side request forgery to internal services
OS command injection through unescaped arguments
Cross-site request forgery on state-changing endpoints
Filed and tracked.
Path traversal via unvalidated route segment in static export
Reflected XSS in dev overlay error frame renderer
CSRF token not validated on server action revalidation endpoint
Command injection through user-supplied build env in turbo runner
DOM XSS via unsanitised hash fragment in router fallback
SQL injection in example app data adapter
Show the audit on your README.
[](https://foundationmachines.ai/scores/0x4m4/hexstrike-ai)How we score.
Every commit is run through static analysis, dynamic fuzzing in an ephemeral microVM and an LLM-assisted review tuned for the AI stack. Three lenses on the same code.
We trace data flow from sources like request bodies, env vars and uploaded files all the way to sinks like SQL clients, shell invocations and outbound HTTP. No taint, no finding.
Nothing is reported without a working proof-of-concept test that triggers the vulnerability. Findings ship with a draft PR you can merge, not a backlog you have to triage.
Get this score for your repo.
Install Sebastion AI on GitHub and get a security score for every PR.