Security Workspace
Vulnerability Intelligence
Clean dashboard, adaptive scan profiles, deduplicated asset-aware findings.
Risk Trend
Risk Distribution
Top Vulnerabilities
Severity Timeline (Executive)
Severity Heatmap
Exposure Snapshot
Top Exposed Assets
Service Inventory
Recent Scans
Port Intelligence
Live AggregationVulnerability Scanner
Focused host and domain assessments with deep fingerprinting, CVE enrichment and role-based scoring.
Use this scanner only for authorized assets.
Latest Scan Findings
Network Discovery Scanner
CIDR subnet enumeration • Host discovery • Service mapping • Authorized networks only
Hosts Alive—
Ports Open—
Services—
Risk Score—
Suggested ranges:
Network scanner requires nmap and is intended exclusively for authorized lab or private networks.
Network Scan Results
Stealth & Intel Scanner
Low-noise probing • Passive metadata enrichment • No evasion — not a bypass tool
⚠️ Stealth mode is low-noise only. It does NOT bypass SIEM, IDS, or security monitoring systems.
Stealth Scan Results
Aggregated Findings
Scan History
Workspace Preferences
Preferences are stored in the browser and applied instantly across the workspace.
Operational Notes
- Findings are deduplicated per project, asset and vulnerability key.
- Dashboard metrics now separate unique host-port exposures from repeated scans.
- Network suggestions are only shown where CIDR scanning is meaningful.
- Stealth mode remains low-noise only and does not attempt monitoring bypass.
- For Vercel Postgres set DATABASE_URL and install psycopg in requirements.
- For MongoDB Atlas on Vercel set MONGODB_URI and optional MONGODB_DB_NAME.
Scanner Reference
Risk Scanner
Use for single hosts and domains when you want broad port, version and HTTP security coverage.
Network Discovery
Use on authorized private networks to enumerate hosts, services and exposed surface by subnet. Access via the Network tab.
Stealth & Intel
Low-noise profiling and passive metadata collection. Access via the Stealth tab.