| File | Date | Author | Commit |
|---|---|---|---|
| docs | 4 days ago |
|
[440ea7] Delete docs/README.md |
| releases | 5 days ago |
|
[c20d8b] Create README.md |
| sample_reports | 5 days ago |
|
[344fd6] Update README.md |
| .gitignore | 5 days ago |
|
[a8a59e] Initial commit |
| README.md | 4 days ago |
|
[fceb61] Update README.md |
Evidence-backed repo forensics. Six artifacts. One run. No guessing.
UC Recon reads your codebase like a senior engineer — then hands you shareable Markdown reports with file:line evidence for every finding.
→ View sample report pack + free download
Here's a real finding from a real open-source repo:
VUL-01 · CRITICAL
Arbitrary Code Execution via PythonAstREPLTool
→ chat_pandas_df.py:74
LLM-generated Python code executed directly — no sandbox, no allowlist.
An adversarial prompt achieves full system access.
Not a pattern match. Not a linter warning. A full reasoning chain from input vector to exploit path, cited with file and line number.
| Artifact | What you get |
|---|---|
| Architecture Overview | System layers, design patterns, strengths and weaknesses |
| Dependency Map | Module relationships, import flow, coupling analysis |
| IO Boundaries | Full attack surface — filesystem, network, database, subprocess |
| Module Inventory | What every key file does, cited with file:line evidence |
| Security Findings | Prioritized vulnerabilities with severity, evidence, and exploit paths |
| Remediation Plan | Actionable hardening checklist, ready to execute |
Precision Trace — Fast and cheap. Targets the most critical paths. Good for regular runs and CI integration.
Full Audit — Deep analysis of the entire repo including dead code, unused imports, and hidden dependencies. UC Recon warns you before running anything costly.
→ Download for Windows (v1.0.1 · EXE)
→ Download for Linux (v1.0.1 · Binary)
See sample_reports/ for real output from UC Recon running against the streamlit-agent open-source repo — including the full IO Boundaries attack surface map, Security Findings with 12 cited vulnerabilities, and the complete Remediation Plan.
This repository hosts releases and sample report artifacts. UC Recon is proprietary software.
Static analyzers find known patterns. UC Recon reasons about your code — it understands architecture, traces data flows, maps attack surfaces, and produces findings a senior engineer would be proud to sign off on.
Prefer zero install? Reply to any outreach email or contact info@01data.ai with a public GitHub URL and we'll run it and send you the report pack directly.
Built by 01Data.AI · v1.0.1