Research Methodology
How we collect and verify the vulnerability statistics shown on our homepage.
Current Research Summary
Last updated: January 29, 2026
Overview
The statistics on our homepage represent real, verified vulnerabilities found through automated scanning of internet-exposed services. Every number we report comes from our own scanner, not estimated or extrapolated data.
Key principle: We only report what we can verify. If our scanner cannot confirm a vulnerability, we do not count it.
Our Process
Target Discovery via Shodan
We use the Shodan API with 207 different search queries to identify candidate IP addresses running AI agent infrastructure. We search for signatures across Python frameworks (Uvicorn, FastAPI, Django, Flask, Gunicorn), Node.js servers (Express, Koa, Next.js), Go/Java/Ruby/Rust frameworks, cloud platforms, and API patterns.
Verification with HackMyAgent Scanner
Each candidate IP is scanned using our HackMyAgent scanner with 25 concurrent connections. The scanner performs active checks for MCP endpoints, exposed configuration files, API keys, Clawdbot/Moltbot gateways, dangerous endpoints, and other vulnerabilities. Only findings confirmed by our scanner are counted.
Aggregation and Reporting
Verified findings are aggregated by vulnerability type. We calculate the vulnerability rate (vulnerable hosts / total scanned) and update our homepage with the results. All raw data is preserved for reproducibility.
Shodan Query Categories
We use 207 queries across these categories to maximize coverage:
SSE Endpoints
5 queriestext/event-stream on ports 80, 443, 3000, 8000, 8080
Python Frameworks
35 queriesUvicorn, FastAPI, Django, Flask, Gunicorn, Tornado, aiohttp
Node.js Servers
30 queriesExpress, Koa, Hapi, Fastify, NestJS, Next.js, Nuxt
WebSocket/Real-time
15 queriesWebSocket upgrades, Socket.io, WS connections
API Patterns
25 queries/api/v1, /api/v2, REST endpoints, GraphQL, OpenAPI
AI/ML Infrastructure
20 queriesLangChain, LlamaIndex, Hugging Face, model endpoints
Cloud Platforms
15 queriesAWS Lambda, GCP Run, Azure Functions, Vercel, Heroku
Debug/Admin Endpoints
20 queries/debug, /admin, /health, /metrics, /status
Go/Java/Ruby/Rust
25 queriesGin, Echo, Spring, Rails, Actix, Rocket
Database/Container UIs
17 queriesMongoDB Express, Redis Commander, Portainer, phpMyAdmin
View sample Shodan queries
Scanner Checks Performed
Our scanner performs 12 active security checks on each target:
mcp-sse-exposedMCP SSE Endpoints
Checks for exposed Server-Sent Events endpoints
mcp-tools-exposedMCP Tools Listing
Checks for exposed tool definitions
api-key-exposedAPI Key Exposure
Scans for leaked API keys in responses
config-file-exposedConfig Files
Checks for exposed configuration files
claude-md-exposedSystem Instructions
Looks for exposed CLAUDE.md files
no-auth-mcpUnauthenticated MCP
Tests for MCP endpoints without auth
outdated-api-endpointDangerous Endpoints
Finds /debug, /execute, /shell endpoints
clawdbot-gateway-exposedClawdbot Gateway
Checks port 18789 for gateway exposure
clawdbot-websocket-exposedClawdbot WebSocket
Checks port 18790 for WebSocket control
outdated-versionOutdated Versions
Detects outdated framework versions
debug-mode-enabledDebug Mode
Identifies debug mode left enabled
dir-listing-enabledDirectory Listing
Checks for enabled directory listing
Current Findings Breakdown
From 11,100 scanned hosts, we found 8,449 total vulnerabilities:
Reproducibility
Our research methodology is documented here for transparency. The scanning approach uses standard security research techniques with publicly available tools.
Ethical Considerations
- •We only scan publicly accessible services (no authentication bypass)
- •We do not exploit vulnerabilities or access private data
- •We anonymize IP addresses in public reports
- •We rate-limit scans to avoid impacting target services
- •Our goal is to help organizations identify and fix security issues
Full Research Report
For the full analysis including detailed vulnerability breakdowns and recommendations, read our published report on the OpenA2A blog.
Questions or Concerns?
If you have questions about our methodology or want to report an issue with our data, please contact us.