Network. Web. Container. Code.
All 4 Layers in One Risk View.
Offensive Security Manager's Security Data Pillar ingests from all four operational attack surface layers simultaneously — feeding the OSM Brain with a complete, correlated intelligence model that no single-domain scanner can architect.
Network Architecture Layer
Infrastructure vulnerability discovery, firewall positioning analysis, and deep-network segmentation mapping. All internal and external routing findings merge into the Security Data pillar for contextual inference.
Web Application Layer
Extensive DAST execution, active API security fuzzing, and complex authentication orchestration logic checks. Core logic is cross-referenced aggressively against the Exploit DB Wizard for active bypass code.
Container Operations Layer
Container image vulnerability evaluation, real-time threat telemetry detection, and Kubernetes orchestration assessment. Interacts with the Asset Information module for swift supply chain exposure quantification.
Source Code Layer
Deep SAST execution, nested dependency mapping, exposed secret string detection, and commit quality analysis. Correlates static pipeline results with live environment variables for confirmed exploit paths.