Joern Hunting Guide

Vulnerability techniques, organized for review.

Browse practical Joern CPGQL patterns for native code, web code, mobile wrappers, Cordova, Flutter native layers, and Electron applications. Start broad, confirm flows, and reduce false positives with context.

Native code

C/C++, Java, JVM bytecode and low-level bugs: memory corruption, UAF, integer issues, filesystem races.

Web services

Java/JVM and web-facing flows: SQL injection, XSS, TLS mistakes, weak crypto and unsafe output.

Mobile apps

Android, iOS, Cordova and Flutter native wrappers: WebView, bridge APIs, storage, manifests and plist review.

Electron apps

Main, preload and renderer review: IPC, Node integration, filesystem access, command execution and updates.

Supported languages: The rules are written as Joern CPGQL patterns for Joern-compatible code: C/C++, Java, JavaScript, JVM bytecode, Kotlin, Swift, PHP, Python, Go, Ruby, and C#. Dart/Flutter app logic and Objective-C require extra tooling, but native wrappers can still be reviewed.
No techniques matched your search.