Documentation Index
Fetch the complete documentation index at: https://docs.superblocks.com/llms.txt
Use this file to discover all available pages before exploring further.
Security scanning is currently in beta. Contact support to get on the waitlist.
What it scans
| Category | What it checks | Example findings |
|---|---|---|
| Dependency vulnerabilities | Package manifests and lockfiles for known CVEs | Outdated package with critical RCE vulnerability |
| Leaked secrets | Source code and built artifacts for exposed credentials | API key hardcoded in a backend query |
| Code vulnerabilities | Application source for common vulnerability patterns | SQL injection via unsanitized user input, cross-site scripting |
When it runs
Security scans run automatically at publish time — after the application is built and before it deploys. The scan evaluates the exact artifact that would ship to production, so there is no gap between what was checked and what was deployed. Builders do not need to trigger scans manually. The scan runs in the background and results appear in the publish readiness checklist.Admin controls
Blocking thresholds
Admins configure which severity levels block publish and which are advisory:| Severity | Recommended mode | Rationale |
|---|---|---|
| Critical | Blocking | High-confidence issues that must be fixed before deploy |
| High | Blocking | Significant vulnerabilities that should not ship |
| Medium | Advisory | Worth reviewing but unlikely to be exploitable in context |
| Low | Advisory | Informational findings for awareness |
Scope
Security scanning applies to all applications in your organization by default. Admins can adjust scope as needed.What builders see
When a security scan completes, builders see findings in their publish readiness checklist:- What was found — clear description of the issue
- Where — file path and location in the application
- Severity — critical, high, medium, or low
- Fix with Clark — one-click remediation for eligible findings
Remediation flow
- Builder clicks Fix with Clark on a finding
- Clark modifies the application to resolve the issue (e.g., removes a hardcoded secret and references an environment variable instead)
- A fresh security scan runs against the updated application
- If the finding is resolved, publish unblocks automatically

