VolPen watches your app traffic while you browse, flags risky endpoints, safely proves exploitable issues, and gives you paste-ready fixes for Cursor, Copilot, or your IDE.

Local security assistant
Ready to scan. Start capture to lock onto this tab and watch network traffic locally.
The demo is intentionally close to the real extension experience. Click through the steps to see how VolPen turns raw traffic into actionable security fixes without forcing you to leave your flow.
Use VolPen as a pre-flight security check before sharing a staging link, shipping a feature, or handing work to a real pentester.
Vibe-coded apps often work beautifully in the happy path but miss boring checks like tenant scoping, cookie flags, and authorization edge cases.
Most scanners are blind to who should access what. VolPen learns context from your actual session and observed routes.
Every important finding should end with a practical remediation prompt your builder can apply immediately.
VolPen focuses on the issues most likely to hurt modern SaaS apps: broken auth, data leaks, API misconfigurations, and common OWASP mistakes.
Passive findings are useful, but confirmed behavior is better. VolPen can replay observed requests with targeted mutations and compare the expected response with reality. Write-capable probes stay locked behind explicit consent.
Security checks are useful only if developers actually leave them on. VolPen is designed to run quietly while you test your product flow.
Pre-filters skip harmless payloads before heavy rules run, so VolPen can watch real browsing without slowing your app down.
Observed endpoints are indexed and grouped so active probes can target admin, auth, and tenant-sensitive paths first.
Common Nuclei-style checks are bundled into the extension, giving you useful coverage without an external scanner.
JWTs, cookies, user IDs, and tenant hints are profiled locally so VolPen can spot authorization flaws that generic scanners miss.
Bring your own Groq key. VolPen redacts secrets, validates findings, and creates a framework-aware remediation brief you can paste into your coding assistant. AI is off by default.
Every finding includes rule ID, severity, evidence, reproduction context, and optional AI remediation. Export it or paste it directly into your coding workflow.
Finding: RLS-002 / IDOR
Endpoint: GET /api/events/:id
Evidence: Adjacent numeric IDs return 200 instead of 403/404.
Fix: Enforce tenant ownership in the data query and never trust route params alone.
// Express — enforce tenant scoping
router.get('/events/:id', requireAuth, async (req, res) => {
const ev = await db.event.findFirst({
where: {
id: req.params.id,
tenantId: req.user.tenantId,
},
});
if (!ev) return res.sendStatus(404);
res.json(ev);
});VolPen earns trust with clear defaults: local analysis, scoped capture, explicit consent, and optional AI.
Detection runs inside the extension. Raw traffic, headers, bodies, and tokens are not uploaded to VolPen servers by default.
Built for Manifest V3 with a strict content security policy and no remote code execution.
Any replay or mutation that could change behavior requires explicit confirmation before it runs.
Scans are scoped to the tab and domain you start from to reduce accidental cross-site capture.
No. VolPen is a developer pre-flight tool. It helps you catch obvious and business-logic issues earlier, before you pay for a formal review.
Start on localhost or staging. Passive capture is low risk, but active replay should be used only where you have permission and understand the impact.
Not by default. The extension analyzes traffic locally. Optional AI review can send redacted finding summaries only after you choose to run it.
Solo builders, AI-assisted teams, agencies, and developers who want a fast security check before sending a link to users, clients, or investors.
Install VolPen, open your app, and start capture. In minutes you will know which findings need attention and what to fix first.