Good controls keep risks low, poor controls let risks grow.
Magebean-CLI audits your Magento store in minutes to identify weak or missing controls, to know exactly what to fix — and why.
$ ./magebean.phar scan --path=/var/www/magento \
--format=html \
--output=report.html
# One command, clean answer.
The Magebean Security Baseline v1 is the foundation of Magebean-CLI. It defines 81 Logic
Rules, which power Magebean-CLI to automatically evaluate configuration, code quality, and security
practices in Magento 2 stores.
$ ./magebean.phar scan \
--path=/var/www/magento \
--format=html --output=report.html
Magebean Security Audit v1.0 Target: /var/www/magento
Time: 2025-10-28 05:26:10 PHP: 8.2 Env: prod
⚠ CVE check skipped
→ Requires CVE Bundle (--cve-data=magebean-known-cve-data-202510.zip)
→ Visit https://magebean.com/download
Findings (5)
[CRITICAL] Magento core outdated — detected 2.4.3, latest 2.4.7-p1
[HIGH] Admin route is default (/admin)
[HIGH] Admin 2FA disabled
[MEDIUM] Folder permission /pub/media is 777
[MEDIUM] Full Page Cache disabled/misconfigured
Summary
Passed Rules: 76 / 81
Issues: 1 Critical, 2 High, 2 Medium
→ Report saved to report.html
Contact: support@magebean.com