Perform security analysis on firmware/binary files. Detects format, identifies security features (NX, ASLR, stack canaries, CFI), extracts strings, generates control flow graphs, and maps findings to NIST SP 800-193.
Customer API key for authentication
Firmware analysis completed
Firmware name
Detected binary format
elf, pe, mach_o, wasm, raw Extracted ASCII strings (max 200)
Detected security features
nx, aslr, stack_canary, cfi, fortify, pie, relro, signed Security findings with severity (CRITICAL, HIGH, MED, LOW, INFO)
[
"MED: NX/DEP bit not enabled",
"LOW: Stack canaries not detected"
]CPU architecture
"x86_64"
Entry point address
"0x401000"
Control Flow Graph in Mermaid format (if available)
Mappings to compliance frameworks
NIST SP 800-193 Platform Firmware Resilience assessment