Public scan — anyone with this URL can view this analysis. Sign up to track your own repos privately, run scheduled re-scans, and get AI fix prompts via your dashboard.

hyperswitch

https://github.com/juspay/hyperswitch.git · scanned 2026-05-17 02:58 UTC (13 hours, 22 minutes ago) · 10 languages

2613 findings (201 legacy + 2412 scanner) 8/10 scanners ran Scanner says 59 (higher by 20)

UNIFIED Repobility · multi-layer engine · AI coders

Complete repo analysis

Last scanned 13 hours, 22 minutes ago · v2 · 2613 findings from 2 sources. Findings combine the legacy security pipeline AND the multi-layer engine (atlas, wiring, flows, ranked) AND verified AI agent contributions.

JSON
Severity distribution — click a segment to filter
Active filters: layer: security × excluding tests × Reset all
Scan summary Repository scanned at 59.3/100 with 100.0% coverage. It contains 17886 nodes across 19 cross-layer flows, written primarily in mixed languages. Engine surfaced 2412 findings — concentrated in frontend (2040), quality (159), cicd (111). Risk profile is high: 21 critical, 26 high, 43 medium. Recommended next step: open the frontend layer findings first — that's where the highest-impact wins live.

Showing 24 of 2613 findings. Click TP / FP to vote on a finding's accuracy — votes adjust the confidence weighting and improve detection across the platform.

low Legacy security credential_exposure conf 1.00 [SEC010] Cloud Provider Token: Cloud provider or SaaS API token found in source code.
Remove immediately and rotate the token. Use environment variables.
crates/hyperswitch_connectors/src/utils.rs:34 credential_exposurelegacy
low Legacy security credential_exposure conf 1.00 [SEC010] Cloud Provider Token: Cloud provider or SaaS API token found in source code.
Remove immediately and rotate the token. Use environment variables.
crates/common_enums/src/enums.rs:6565 credential_exposurelegacy
critical Legacy security credential_exposure conf 1.00 [SEC022] Database URL With Embedded Credential: A database connection URL contains an embedded username and password. These URLs are often copied into defaults, docs, and scripts, then leak working credentials.
Remove the embedded password, require the URL from a secret store or environment variable, and rotate the database credential.
crates/hsdev/src/input_file.rs:22 credential_exposurelegacy
critical Legacy security credential_exposure conf 1.00 [SEC022] Database URL With Embedded Credential: A database connection URL contains an embedded username and password. These URLs are often copied into defaults, docs, and scripts, then leak working credentials.
Remove the embedded password, require the URL from a secret store or environment variable, and rotate the database credential.
crates/common_utils/src/lib.rs:324 credential_exposurelegacy
critical Legacy security credential_exposure conf 1.00 [SEC022] Database URL With Embedded Credential: A database connection URL contains an embedded username and password. These URLs are often copied into defaults, docs, and scripts, then leak working credentials.
Remove the embedded password, require the URL from a secret store or environment variable, and rotate the database credential.
crates/analytics/src/sqlx.rs:45 credential_exposurelegacy
critical 9-layer security owasp conf 1.00 Insecure pattern 'private_key_in_repo' in crates/connector_configs/toml/development.toml:5893
Found a known-risky pattern (private_key_in_repo). Review and replace if possible.
crates/connector_configs/toml/development.toml:5893 owaspprivate_key_in_repo
critical 9-layer security owasp conf 1.00 Insecure pattern 'private_key_in_repo' in crates/connector_configs/toml/production.toml:5658
Found a known-risky pattern (private_key_in_repo). Review and replace if possible.
crates/connector_configs/toml/production.toml:5658 owaspprivate_key_in_repo
critical 9-layer security owasp conf 1.00 Insecure pattern 'private_key_in_repo' in crates/connector_configs/toml/sandbox.toml:5857
Found a known-risky pattern (private_key_in_repo). Review and replace if possible.
crates/connector_configs/toml/sandbox.toml:5857 owaspprivate_key_in_repo
critical 9-layer security secrets conf 1.00 Possible secret in config/deployments/drainer.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/deployments/drainer.toml:34 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/development.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/development.toml:24 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/development.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/development.toml:34 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/development.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/development.toml:1365 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/development.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/development.toml:1392 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/docker_compose.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/docker_compose.toml:31 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/docker_compose.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/docker_compose.toml:46 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/docker_compose.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/docker_compose.toml:1190 secrets
critical 9-layer security secrets conf 1.00 Possible secret in config/docker_compose.toml
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
config/docker_compose.toml:1227 secrets
critical 9-layer security secrets conf 1.00 Possible secret in crates/hsdev/src/main.rs
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
crates/hsdev/src/main.rs:103 secrets
critical 9-layer security secrets conf 1.00 Possible secret in crates/hsdev/src/main.rs
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
crates/hsdev/src/main.rs:124 secrets
critical 9-layer security secrets conf 1.00 Possible secret in scripts/create_default_user.sh
Detected pattern matching password_literal. Rotate the credential and move to a secret manager.
scripts/create_default_user.sh:3 secrets
high 9-layer security owasp conf 1.00 Insecure pattern 'eval_used' in crates/redis_interface/src/module/fred/commands.rs:1168
Found a known-risky pattern (eval_used). Review and replace if possible.
crates/redis_interface/src/module/fred/commands.rs:1168 owaspeval_used
medium 9-layer security owasp conf 1.00 Insecure pattern 'weak_hash' in crates/hyperswitch_connectors/src/connectors/trustly/transformers.rs:350
Found a known-risky pattern (weak_hash). Review and replace if possible.
crates/hyperswitch_connectors/src/connectors/trustly/transformers.rs:350 owaspweak_hash
medium 9-layer security owasp conf 1.00 Insecure pattern 'weak_hash' in crates/hyperswitch_connectors/src/connectors/zsl/transformers.rs:129
Found a known-risky pattern (weak_hash). Review and replace if possible.
crates/hyperswitch_connectors/src/connectors/zsl/transformers.rs:129 owaspweak_hash
medium 9-layer security owasp conf 1.00 Insecure pattern 'weak_hash' in crates/router/src/utils/user/two_factor_auth.rs:24
Found a known-risky pattern (weak_hash). Review and replace if possible.
crates/router/src/utils/user/two_factor_auth.rs:24 owaspweak_hash
{# ── 2026-05-17 Round 14: AI-agent bridge footer ────────────────────── Discoverability: the /agents/voting/ guide + MCP manifest exist but aren't linked from anywhere users actually land. Small, opt-in footer. #}
For AI agents: Voting guide (TP/FP) MCP manifest Stdio wrapper SARIF Integrate Findings queue Vote TP/FP on findings to calibrate the engine.
For AI agents + API integrations
Email me when this repo regresses
Free. We re-scan periodically; new criticals → your inbox. No signup required for the scan itself.
API access

This page is publicly accessible at: https://repobility.com/scan/9c39f054-10cb-4584-aa89-251222603de5/

To check status programmatically (no auth required):

curl -s https://repobility.com/api/v1/public/scan/9c39f054-10cb-4584-aa89-251222603de5/

Important — please don't re-submit the same URL repeatedly. The submission endpoint is idempotent: re-submitting the same git URL returns this same scan_token, not a new one. To re-scan this repo, sign up free and use the dashboard.