Infrastructure Scenario Tests

We test Corax against real-world infrastructure failures across every vendor, platform, and scenario. Browse the results below.

21,502
Total Tests
100.0%
Pass Rate
21,502
Passed
0
Failed

Internal CA Certificate Expiring in 24 Hours

PASS

The organization's internal CA intermediate certificate expires tomorrow. All internal services using certificates signed by this CA will fail TLS validation.

SecurityPattern: SSL_ERRORSeverity: HIGHConfidence: 64%Auto-Heal

SSL Certificate Expired on Production Web Server

PASS

The SSL certificate for the main customer-facing website has expired. All HTTPS connections show browser warnings and HSTS-enabled clients cannot connect at all.

SecurityPattern: CERTIFICATE_EXPIRYSeverity: CRITICALConfidence: 72%Auto-Heal

Database Credentials Committed to Public Git Repo

PASS

GitHub Secret Scanning detected production database credentials committed to a public repository. Credentials are for the production PostgreSQL instance.

SecurityPattern: UNKNOWNSeverity: MEDIUMConfidence: 68%Auto-Heal

UFW Disabled After System Update

PASS

A system update disabled UFW (Uncomplicated Firewall), exposing all ports to the network. Server now has 15 open ports that should be firewalled.

SecurityPattern: UNKNOWNSeverity: MEDIUMConfidence: 68%Auto-Heal

Unauthorized SSH Key Added to Root Account

PASS

An unauthorized SSH public key was added to /root/.ssh/authorized_keys. The key does not match any known employee keys. Possibly from a compromised service account.

SecurityPattern: UNKNOWNSeverity: MEDIUMConfidence: 68%Auto-Heal

RDP Brute Force — Distributed Attack

PASS

Multiple IP addresses are brute forcing RDP on a Windows server exposed to the internet. 10 IPs rotating through common username/password combinations.

SecurityPattern: UNKNOWNSeverity: MEDIUMConfidence: 68%Auto-Heal

Windows Firewall Rule Allowing All Inbound

PASS

A misconfigured Windows Firewall rule is allowing all inbound traffic on all ports. The rule was created by an installer and overrides the default block.

SecurityPattern: EXCHANGE_EVENTSeverity: HIGHConfidence: 68%Auto-Heal

SSH Brute Force Attack from Single IP

PASS

A single IP address is attempting SSH brute force login with 500+ attempts per minute. fail2ban is not installed. Root login is permitted.

SecurityPattern: SERVER_ERRORSeverity: HIGHConfidence: 55%Auto-Heal

TLS 1.0/1.1 Enabled After Config Rollback

PASS

A configuration rollback re-enabled TLS 1.0 and 1.1 on the production load balancer. PCI DSS compliance violated. Vulnerability scanners firing alerts.

SecurityPattern: LOAD_BALANCER_EVENTSeverity: HIGHConfidence: 68%Auto-Heal

Kubernetes TLS Secret Expired — Ingress Broken

PASS

The TLS secret used by the Kubernetes ingress controller has expired. All ingress routes returning TLS errors.

SecurityPattern: CERTIFICATE_EXPIRYSeverity: CRITICALConfidence: 72%Auto-Heal

OAuth2 Provider Outage — All SSO Logins Failing

PASS

The external OAuth2/OIDC identity provider (Okta) is experiencing a major outage. All SSO login attempts fail because the authorization endpoint is unreachable. Users cannot authenticate to any application that relies on Okta for SSO, affecting the entire organization.

SecurityPattern: CONNECTION_REFUSEDSeverity: CRITICALConfidence: 95%Remote Hands36 correlated

JWT Token Signing Key Rotation Failure — Authentication Broken

PASS

A JWT signing key rotation was performed on the authentication service, but the new public key was not distributed to 4 of 7 microservices that validate tokens. These services are rejecting all tokens signed with the new key, while the auth service has stopped issuing tokens with the old key.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Auto-Heal36 correlated

Vulnerability Scan — Critical CVE Detected on Production

PASS

An automated vulnerability scan discovers a critical CVE with a CVSS score of 10.0 affecting the production web server software. The vulnerability allows unauthenticated remote code execution and has a known public exploit. The affected software is running on 15 production servers.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands18 correlated

Security Audit Failure — Weak Cipher Suites on Production

PASS

A quarterly security audit discovers that 23 production services are still offering deprecated cipher suites including RC4, DES, and 3DES. Several services also support TLS 1.0 and 1.1. This fails PCI DSS Requirement 4.1 and multiple CIS benchmarks.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 85%Remote Hands18 correlated

Failed Penetration Test — Critical RCE Finding in Production

PASS

An external penetration test discovers a critical remote code execution vulnerability in the production API through an unsanitized file upload endpoint. The pentester demonstrates full shell access to the application server and lateral movement to the database server.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands18 correlated

CIS Benchmark Drift — Hardening Configuration Reverted

PASS

A weekly CIS benchmark compliance scan detects that 43 production servers have drifted from their hardened baseline. An unauthorized configuration management change reverted SSH hardening, disabled audit logging, and re-enabled insecure protocols across the production fleet.

SecurityPattern: SSL_ERRORSeverity: CRITICALConfidence: 90%Remote Hands18 correlated

GDPR Data Retention Violation — PII Not Purged

PASS

A GDPR compliance scan discovers that the automated data retention purge job has been silently skipping records due to a foreign key constraint error. 2.3 million EU user records past their retention period have not been deleted, violating GDPR Article 5(1)(e) storage limitation principle.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands18 correlated

SOC 2 Access Control Violation — Terminated Employee Still Active

PASS

An automated SOC 2 compliance scan discovers 14 terminated employee accounts that are still active across production systems. The offboarding automation failed silently for 3 months, and these accounts retain full production access including database admin and cloud console roles.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 85%Remote Hands18 correlated

HIPAA Audit Log Gap — Logging Service Failure

PASS

The centralized audit logging service for a healthcare application has been silently failing for 72 hours. No access logs for electronic protected health information (ePHI) were captured during this period, creating a HIPAA audit trail gap that must be reported and remediated.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands18 correlated

PCI DSS Scope Creep — Unencrypted Cardholder Data Detected

PASS

A database scan discovers unencrypted cardholder data (primary account numbers) stored in a staging database that was never intended to be in PCI scope. A developer copied production data to staging for debugging without masking sensitive fields, violating PCI DSS Requirement 3.4.

SecurityPattern: UNKNOWNSeverity: CRITICALConfidence: 95%Remote Hands18 correlated
Page 1 of 2Next

Every scenario is tested against Corax's Neural Engine in a production environment with AI-powered root cause analysis.

Tests run continuously as new infrastructure patterns are added.