The Argil DX AEM security check simulates 4-6 visitors going to your website and checking for common and uncommon AEM vulnerabilities. Instead of trying to circumvent security measures on your site, it looks only at publicly available information that can be found through loopholes in your current site.
Often the developers implementing AEM are skilled generalists, but they don't have the targeted expertise of a dedicated AEM team. It's easy to leave a few security holes during implementation while attention is devoted to other aspects of the website. Errors in implementation can leave common vulnerabilities open, but the uncommon vulnerabilities can be overlooked by even the most experienced AEM developer.
Jason Meyer, our company president, has been finding vulnerabilities in AEM as a hobby since the days when AEM was first introduced as its former name, CQ5. AEM security has been a passion of his for 9 years and he's constantly trying to find new vulnerabilities and ways to fix them in order to keep Argil DX on the cutting edge of AEM security.