Skip to main content

Overview

The Technology Index provides a unified catalog of every technology detected across your infrastructure — including frameworks, libraries, languages, server technologies, and third-party components. AIM automatically correlates these technologies with assets, environments, and exposure levels to help teams understand where critical dependencies exist and what risks they introduce.

Technology Stack Overview


Key Metrics

Total Technologies

Total unique technologies detected across all assets.

Internal Technologies

Technologies found exclusively in internal or private environments.

External Technologies

Technologies detected on publicly exposed or internet-facing assets.

Technology Usage Distribution

Technology Usage Chart

This visualization shows which technologies are most commonly used across your environment, helping teams quickly identify:
  • High-dependency frameworks
  • Legacy or low-usage libraries
  • Technology clusters that may require deeper risk analysis

Exposure Distribution

Internal vs External Technology Exposure

Exposure data highlights whether a technology is used on external or internal surfaces — critical for:
  • Prioritizing patching based on exposure
  • Identifying externally-accessible components
  • Understanding attack surface expansion

Environment Distribution

Environment Mapping

This section shows where technologies are deployed across environments like:
  • Production
  • Staging
  • Development
  • Shadow environments

Technology Directory

Below the analytics dashboard, AIM provides a searchable directory of all detected technologies. Each item includes:
FieldDescription
Technology NameFramework, library, or component (e.g., React, Nginx, TLS).
Asset CountNumber of assets using that technology.
SourceAdapter or discovery method that detected it.
TagsBusiness or technical classification tags.
AssociationsRelated assets, clusters, or dependencies.

Technology Directory List


Technology Details (Full View)

Each technology includes a dedicated detail page providing:

🔹 Summary

  • Technology name
  • Type (Framework, Server, Library, Protocol)
  • Exposure level
  • Total assets using it

🔹 Associated Assets

List of all assets (IPs, domains, applications, etc.) linked with this technology.

🔹 Tags & Metadata

Automatic or manual tags applied for classification.

🔹 Discovery Timeline

  • First detection
  • Last detection
  • Associated adapters

How Technologies Are Detected

AIM identifies technologies using a combination of:
  • ASM technology signatures
  • VM vulnerability fingerprints
  • Request/response pattern analysis
  • Headers, banners, and server metadata
  • Frontend technology detection
  • API schema and response pattern identification
This ensures full-stack coverage across APIs, servers, web apps, and more.

Example Use Cases

Tech Stack Governance

Maintain visibility into all frameworks and libraries used across teams.

Dependency Risk Management

Identify outdated or vulnerable technologies tied to critical assets.

External Exposure Analysis

Detect which technologies are publicly exposed and prioritize mitigation.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.