SecurityClaw Demos

Real campaigns. Documented results. No cherry-picking.
How these demos work: Every SecurityClaw Demo is a real campaign run against a target we built and controlled. We're not hiding failures — we show exactly what each tool found, what it missed, and why. If SecurityClaw's AI layer can close the gap, we show that too. If it can't yet, we say so. We create our own targets because we're in product validation mode, not red team mode — that transparency is part of how we build trust with security professionals.

🎯 SecurityClaw Capability Scorecard

Live results across all demo campaigns. Updated as each campaign is published. Failures are visible — that's the point. 25 campaigns completed. Overall pass rate: 92.00%

🔑 Secrets Detection 2 campaigns — TruffleHog 80% / Gitleaks 75%

TruffleHog: 4/5 secrets found. Stripe live key not in v2 ruleset — demo #1. Gitleaks: 6/8 unique secrets in 13.2ms — deleted RSA key found in git history, base64 caught via entropy. AWS secret key + PostgreSQL YAML password missed — demo #13.

🌐 Web Misconfiguration & Enumeration 3 campaigns — Nikto 100% / Nuclei 83% / Gobuster 100%

Nikto: 5/5 planted misconfigs in 4s — demo #2. Nuclei: 5/6 classes in 8s (phpinfo mock incomplete) — demo #5. Gobuster: 10/10 paths in 4.79s, 3 CRITICAL (backup.zip, config.bak, live API keys), 0 false positives — demo #12.

📦 Supply Chain Security 3 campaigns — 100% detection rate

npm-audit: 8/8 vulnerable packages, 15 CVEs in 2.1s — demo #3. Supply-chain-scanner: 7/7 planted threats (SANDWORM_MODE, typosquats, curl|bash) in 0.19s — demo #9. Gitleaks: git history secret detection — demo #13.

🔐 Password Security 1 campaign — 5/6 hashes cracked, bcrypt resisted

Hashcat: MD5, NTLM, SHA-1, SHA-256, SHA-512 all cracked in under 1 second. bcrypt (rounds=10) resisted. Key metric: NTLM vs bcrypt = 59,034× speed gap — demo #14.

🔒 WordPress Security 1 campaign — Partial (AI gap-fill active)

WPScan: 3 INFO automated (passive mode defeated by WP Engine hardening). Manual analysis: 7 components identified, 0 CVEs — demo #4.

💉 SQL Injection 1 campaign — 2/4 at Level 1 (4/4 at Level 2)

sqlmap: 2 injection points detected at default settings, full DB dump in 4s. Cookie + LIKE-clause injection requires Level 2 — demo #6.

☁️ Cloud Misconfiguration No campaigns yet

Prowler / ScoutSuite demos in pipeline.

🔌 API Security 1 campaign — 2/4 core vulns + 11 bonus findings

Swagger/OpenAPI scanner: 1 Critical (unauthenticated admin), 3 shadow endpoints, secret key leak — 13 findings in 2.4s. Excessive data exposure + deprecated API checks on roadmap — demo #7.

📡 Network Reconnaissance 1 campaign — 6 critical misconfigs in 6.32s

nmap: anonymous FTP, vsftpd 2.3.4 backdoor, CVE-2021-41773 Apache, exposed Tomcat Manager, unauthenticated Redis, EOL MySQL — demo #8.

🔍 Passive Reconnaissance 1 campaign — 79 subdomains, 12+ years history

CT logs (cert transparency): 1,499 certs, 79 unique subdomains from superdrug.com in 12.57s — zero packets sent to target — demo #10.

📦 Container & Dependency Security 1 campaign — 100 CVEs in 63ms

Trivy: 21 CRITICAL + 79 HIGH across Flask + React demo app (2017-2018 deps). 3× RCE in Handlebars, PyYAML ACE, Django SQLi ×4, Pillow memory corruption — demo #11.

All Demos