Local-first Chrome security testing for AI-built apps

Find auth bugs before your users do.

VolPen watches your app traffic while you browse, flags risky endpoints, safely proves exploitable issues, and gives you paste-ready fixes for Cursor, Copilot, or your IDE.

Waiting for Chrome Web Store Approval
Try the demo
No signup requiredTraffic stays local by defaultOpen-source friendly
VolPen Logo

VOLPEN

Local security assistant

CAPTURE
REVIEW
PROVE
AI
FIX
Ready on: app.example.com

Ready to scan. Start capture to lock onto this tab and watch network traffic locally.

0
Requests
0
Endpoints
0
Findings
0
High risk
Live product flow

From scan to fix in one popup.

The demo is intentionally close to the real extension experience. Click through the steps to see how VolPen turns raw traffic into actionable security fixes without forcing you to leave your flow.

  • Hit record and browse your app normally.
  • Review findings with evidence and severity.
  • Run consent-gated probes to confirm the bug.
  • Copy a fix brief straight into your AI coder.
19
Detection rules
8
Active proof checks
0
Raw traffic uploaded by default
<5 min
From install to first finding
Why VolPen

Built for builders who move too fast for traditional pentesting

Use VolPen as a pre-flight security check before sharing a staging link, shipping a feature, or handing work to a real pentester.

AI makes apps faster to ship — and easier to mis-secure

Vibe-coded apps often work beautifully in the happy path but miss boring checks like tenant scoping, cookie flags, and authorization edge cases.

Generic scanners miss your business logic

Most scanners are blind to who should access what. VolPen learns context from your actual session and observed routes.

Reports are not the outcome. Fixed code is.

Every important finding should end with a practical remediation prompt your builder can apply immediately.

Detection coverage

Catch the bugs that actually block a launch

VolPen focuses on the issues most likely to hurt modern SaaS apps: broken auth, data leaks, API misconfigurations, and common OWASP mistakes.

4 rules

Auth & tenant leaks

  • Cross-tenant data leakage
  • IDOR via sequential IDs
  • Mass assignment bugs
  • Broken authorization checks
4 rules

API security mistakes

  • Rate limiting gaps
  • CORS misconfigurations
  • Weak JWT handling
  • Excessive data exposure
11 rules

OWASP basics

  • Reflected & DOM XSS
  • SQL injection signals
  • Missing CSRF tokens
  • Bad cookie flags
  • Sensitive data in URLs
  • Open redirects
  • Mixed content
Active proof

Do not just flag it. Prove it.

Passive findings are useful, but confirmed behavior is better. VolPen can replay observed requests with targeted mutations and compare the expected response with reality. Write-capable probes stay locked behind explicit consent.

IDOR
Swap numeric IDs
CROSS_TENANT
Replay with another tenant
MASS_ASSIGNMENT
Inject privileged fields
AUTH_STRIP
Remove auth and compare
HEADER_STRIP
Drop security headers
SWEEP_TENANT
Fan out across tenant paths
SWEEP_IDOR
Enumerate profiled routes
SWEEP_MASS_ASSIGN
Find unsafe writes
The engine

Local scanning without the lag

Security checks are useful only if developers actually leave them on. VolPen is designed to run quietly while you test your product flow.

Fast enough to leave running

Pre-filters skip harmless payloads before heavy rules run, so VolPen can watch real browsing without slowing your app down.

Understands routes as you browse

Observed endpoints are indexed and grouped so active probes can target admin, auth, and tenant-sensitive paths first.

Known signatures built in

Common Nuclei-style checks are bundled into the extension, giving you useful coverage without an external scanner.

Learns identity context

JWTs, cookies, user IDs, and tenant hints are profiled locally so VolPen can spot authorization flaws that generic scanners miss.

AI fixes

Optional AI review that ends in a patch

Bring your own Groq key. VolPen redacts secrets, validates findings, and creates a framework-aware remediation brief you can paste into your coding assistant. AI is off by default.

What the AI layer does

validate-finding
Checks whether passive detections look actionable.
validate-active-result
Reads replay outcomes to confirm exploitability.
generate-payload
Suggests targeted payloads for mass-assignment and auth tests.
remediate
Produces a clean, language-specific code fix pattern.
Output

Skip the PDF. Give your builder the fix.

Every finding includes rule ID, severity, evidence, reproduction context, and optional AI remediation. Export it or paste it directly into your coding workflow.

Example fix brief

Finding: RLS-002 / IDOR
Endpoint: GET /api/events/:id
Evidence: Adjacent numeric IDs return 200 instead of 403/404.
Fix: Enforce tenant ownership in the data query and never trust route params alone.

// Express — enforce tenant scoping
router.get('/events/:id', requireAuth, async (req, res) => {
  const ev = await db.event.findFirst({
    where: {
      id: req.params.id,
      tenantId: req.user.tenantId,
    },
  });

  if (!ev) return res.sendStatus(404);
  res.json(ev);
});
JSON exportHTML reportCopy prompt
Privacy & safety

Security tooling should not become the security risk

VolPen earns trust with clear defaults: local analysis, scoped capture, explicit consent, and optional AI.

Local-first by default

Detection runs inside the extension. Raw traffic, headers, bodies, and tokens are not uploaded to VolPen servers by default.

Strict MV3 posture

Built for Manifest V3 with a strict content security policy and no remote code execution.

Consent gates for active probes

Any replay or mutation that could change behavior requires explicit confirmation before it runs.

Pinned tab and domain scope

Scans are scoped to the tab and domain you start from to reduce accidental cross-site capture.

FAQ

Answer the doubts before they block the install

Is this a replacement for a professional pentest?

No. VolPen is a developer pre-flight tool. It helps you catch obvious and business-logic issues earlier, before you pay for a formal review.

Can I use it on production?

Start on localhost or staging. Passive capture is low risk, but active replay should be used only where you have permission and understand the impact.

Does my app traffic leave my machine?

Not by default. The extension analyzes traffic locally. Optional AI review can send redacted finding summaries only after you choose to run it.

Who is this for?

Solo builders, AI-assisted teams, agencies, and developers who want a fast security check before sending a link to users, clients, or investors.

Free to try • no signup • local-first

Run a security check before your next deploy.

Install VolPen, open your app, and start capture. In minutes you will know which findings need attention and what to fix first.

Awaiting Chrome Web Store Approval
View source
Best used on localhost or staging. Active probes require explicit consent.