An important difference between Wallarm and many other products, including the famous WAF, is its detection not only of hacker attacks, but also web application vulnerabilities. To make a truly quality vulnerability detector, we had to consider all the approaches that already exist — and develop our own. A crawling problem An efficient vulnerability search is impossible without an understanding of how web applications are structured. However, many of today’s applications use an asynchronous work model with clients,…