Good controls keep risks low, poor controls let risks grow.
Magebean-CLI assesses your Magento store in minutes to identify weak or missing controls, to know exactly what to fix — and why.
$ ./magebean.phar scan --path=/var/www/magento \
--format=html \
--output=report.html \
--detail
# One command, clean answer.
Security begins with order.
The baseline defines what “right” looks like — the known-good state.
But with time, every system drifts.
Audit exists to see how far reality has moved from the baseline.
Once you can see the drift, you can restore the order.
$ ./magebean.phar scan \
--path=/var/www/magento \
--format=html --output=report.html
Magebean Security Audit v1.0 Target: /var/www/magento
Time: 2026-01-22 03:56:00 PHP: 8.2 Env: prod
⚠ CVE check skipped
→ Requires CVE Bundle (--cve-data=magebean-known-cve-data-202601.zip)
→ Visit https://magebean.com/download
Findings (5)
[CRITICAL] Magento core outdated — detected 2.4.3, latest 2.4.7-p1
[HIGH] Admin route is default (/admin)
[HIGH] Admin 2FA disabled
[MEDIUM] Folder permission /pub/media is 777
[MEDIUM] Full Page Cache disabled/misconfigured
Summary
Passed Rules: 76 / 81
Issues: 1 Critical, 2 High, 2 Medium
→ Report saved to report.html
Contact: support@magebean.com