Published proof
Why regex-based SAST misses multi-hop SQL injection
A source-to-sink walkthrough showing how user input can cross helper functions before it reaches a SQL query, and why pattern matching alone can miss the connected flow.
Proof pages
SiteShadow proof pages show the vulnerable flow first, then explain why taint tracking matters: sources, helper functions, sinks, and fixes in plain code.
Published proof
A source-to-sink walkthrough showing how user input can cross helper functions before it reaches a SQL query, and why pattern matching alone can miss the connected flow.
Coverage proof
A technical coverage page showing supported languages, vulnerability classes, benchmark methodology, current benchmark evidence, and limitations. This is the source a buyer should read before accepting any broad coverage claim.