Skip to content

Overview

The Findings Explorer is a unified dashboard for browsing all memory items in your project — both from Genesis Scan analysis and from session enrichment. It replaces the older layer-specific views with a single, searchable interface organized by knowledge category.

Navigate to Findings Explorer from the sidebar.

Data sources

The Findings Explorer aggregates items from two pipelines:

SourceBadgeDescription
Genesis ScanScanItems produced by running a full codebase analysis
Session EnrichmentSessionItems captured from coding sessions via VS Code extension, CLI, or MCP
ManualManualItems created or imported manually

Each finding card displays a colored source badge so you can tell at a glance where the knowledge came from.

View modes

Toggle between two views using the switcher in the top-right corner:

Highlights

The default view shows a summary dashboard with several panels:

  • Scan Summary — Total findings, category count, security issue count, and average confidence
  • Knowledge Sources — Distribution of items by source (Scan, Session, Manual) with counts and percentage bars
  • Category Heatmap — Top categories ranked by item count, with orange intensity scaling to show knowledge concentration
  • Top 10 Findings — The highest-importance findings across all categories, ranked by importance and confidence
  • Module Map — A visual breakdown of which parts of your codebase have the most findings
  • Security Highlights — A preview of the top security findings (only items tagged as real vulnerabilities)

Click Explore All Findings at the bottom to switch to the full list.

All Findings

The full list view includes:

  • Search bar — Filter findings by title or content
  • Confidence slider — Set a minimum confidence threshold (0–100%)
  • Category tabs — Filter by knowledge category (see below)

Category tabs

Findings are organized into 27 categories derived from the schema key taxonomy. Tabs only appear when they have items — empty categories are hidden.

Core categories

CategorySchema KeyDescription
Productroot/productBusiness logic, user flows, feature boundaries
Architectureroot/architectureTech stack decisions, patterns, structure
Conventionsroot/conventionsCoding style, naming, organization rules
Decisionsroot/decisionsArchitectural decision records

Domain categories

CategorySchema KeyDescription
Stackroot/stackDependencies, frameworks, configs
Authroot/authAuthentication, sessions, tokens
Securityroot/securityReal vulnerabilities (OWASP-style issues tagged security)
Risksroot/securityTechnical debt and improvement suggestions (security-adjacent items not tagged as vulnerabilities)
Dataroot/dataDatabase schema, migrations, seed data
Performanceroot/perfIndexes, caching, query optimization
Infrastructureroot/infraCI/CD, Docker, deployment
Testingroot/testingTests, mocks, fixtures
Docsroot/docsREADME, guides, documentation

Code area categories

CategorySchema KeyDescription
Frontendroot/frontend/*UI, components, routes, hooks, state
Backendroot/backend/*API endpoints, services, business logic
Data Flowroot/dataflowSchemas, types, API contracts
Entry Pointsroot/entrypointsRoutes, pages, middleware
Dependenciesroot/dependenciesPackages, versions, usage

Package categories

CategorySchema KeyDescription
CLIroot/cliCLI package findings
MCProot/mcpMCP server package findings
VS Coderoot/vscodeVS Code extension package findings

Activity categories

CategorySchema KeyDescription
Journalroot/journalImplementation journal entries
Bugsroot/bugsBug fixes, workarounds
Todoroot/todoPending tasks, known issues
Code Maproot/codemapCodebase structure from scan

Security vs Risks

The Findings Explorer distinguishes between Security and Risks:

  • Security — Genuine vulnerabilities detected during Genesis Scan's security audit layer (items tagged security). These are OWASP-category issues like injection, authentication flaws, and XSS.
  • Risks — All other items under the root/security schema key that are not tagged as vulnerabilities. These include technical debt, configuration concerns, and improvement suggestions.

This split ensures the Security tab only shows actionable vulnerabilities, while Risks captures the broader analysis. For a dedicated security workflow, use the Security Center.

Finding cards

Each finding card displays:

  • Title and expandable details
  • Source badge — Scan (blue), Session (green), or Manual (gray)
  • Freshness indicator — Relative time since the item was last updated (e.g., "2 days ago", "3 weeks ago")
  • Confidence score — AI confidence as a percentage
  • Importance — Star rating (1–5)
  • Tags — Category labels and custom tags

Click a card to expand it and see:

  • Full description with all facts
  • Rationale — Why this finding matters
  • Impact — What areas of the codebase are affected
  • Related files — Source file paths (linked to GitHub when a repository is connected)

Loading behavior

Findings load progressively in pages of 50 items. A progress bar shows loading status when there are more items than the initial page. All filtering and searching work on the fully loaded dataset.

Prerequisites

The Findings Explorer requires memory items in your project. Populate them by:

Without any items, the page shows an empty state prompting you to run a scan.

Next steps