# Coverage and Findings

Understand what Aikido tests and how to read common classes of findings.

Use this section to see coverage areas and deeper examples.

<table data-view="cards"><thead><tr><th>Guide</th><th>What it covers</th><th data-hidden data-card-target data-type="content-ref">Target</th></tr></thead><tbody><tr><td><strong>What Issues Can Aikido Pentest Find?</strong></td><td>Coverage across OWASP, logic flaws, and hardening gaps.</td><td><a href="coverage-and-findings/what-issues-can-aikido-pentest-find">what-issues-can-aikido-pentest-find</a></td></tr><tr><td><strong>Understanding Pentest Coverage</strong></td><td>What it does and doesn't mean.</td><td><a href="coverage-and-findings/understanding-pentest-coverage">understanding-pentest-coverage</a></td></tr><tr><td><strong>Threat Model</strong></td><td>How to read recon output and the attack plan.</td><td><a href="coverage-and-findings/threat-model">threat-model</a></td></tr><tr><td><strong>Human in the Loop</strong></td><td>When to use escalation and what to expect from the follow-up run.</td><td><a href="coverage-and-findings/human-in-the-loop">human-in-the-loop</a></td></tr></tbody></table>
