LLM Providers
Runtime coverage, provider health, and confidence participation for this run.
✓ ollama (1 results)
✓ gemini (4 results)
✗ gpt — account
Decision Trace
Why these findings are visible: provider participation, project rules, suppressions, and score inputs.
Providers
Requestedollama, gemini, gpt
Returned resultsollama: 1, gemini: 4
Failedgpt: Error code: 429 - {'error': {'message': 'You exceeded your current quota, please check your plan and billing details. For more information on this error, read the docs: https://platform.openai.com/docs/guides/error-codes
Coverage2/3 provider(s) returned usable results
Provider Health
gptAccount or billing issue • Check billing, credits, or plan status for this provider account.
Filtering
Visible findings5 findings • 0 observations
Project ignore rules0 findings • 0 observations • 0 conflicts • 0 logic hotspots
Suppressions0 findings • 0 observations • 0 active rules
Run Scope
Score92/100 visible review score
Score confidencePartial confidence — 2/3 provider(s) usable.
Useful signal, but not full-strength consensus.
Git diff modedisabled
Issues (5)
Validated findings ranked by severity, confidence, and provider agreement.
Command injection vulnerability due to direct interpolation of user-controlled input (target_path) into a shell command executed with `shell=True`. An attacker can execute arbitrary commands by crafting a malicious target_path.
Detected by: ✓ gemini ×1.5 1/2 provider(s) agreed
Always returns true due to undefined behavior of bare string literal comparison.
Detected by: ✓ ollama ×0.9 1/2 provider(s) agreed
The condition `if user_role == "admin" or "staff"` is always truthy because the string literal `"staff"` evaluates to `True` in a boolean context. This makes the `can_delete_account` function always return `True` when this branch is taken, effectively bypassing both the admin/staff check and rendering the owner check (`account_owner == actor` on line 5) unreachable. This is a critical authorization bypass vulnerability.
Detected by: ✓ gemini ×0.9 1/2 provider(s) agreed
Attempting to import a package 'not_a_real_package' that likely does not exist, leading to an ImportError.
Detected by: ✓ gemini ×0.9 1/2 provider(s) agreed
The 'divide_total' function does not handle cases where 'count' is zero, which will result in a ZeroDivisionError.
Detected by: ✓ gemini ×0.9 1/2 provider(s) agreed
Share Hooks
Built-in viral angles you can reuse in screenshots, launch posts, demos, and client updates.
Clean-run flex_selftest_fixture cleared a multi-model audit with a 92/100 health score.
Strong first-run win that is easy to screenshot and share.
AI disagreement revealNexaVerify found 1 places where models disagreed — exactly where human judgment still matters.
Disagreement zones are naturally curiosity-inducing and highly shareable.
Subtle logic catchThe consensus watchlist surfaced 2 subtle logic risks that a single-model pass could miss.
Highlights differentiated value beyond ordinary bug detection.