Security Workspace

Vulnerability Intelligence

Clean dashboard, adaptive scan profiles, deduplicated asset-aware findings.

Average Risk 0.0 Selected time window
Total Scans 0 Reports saved
Unique Vulnerabilities 0 Aggregated by vuln key
Affected Assets 0 Across current project

Risk Trend

Risk Distribution

Top Vulnerabilities

Severity Timeline (Executive)

Severity Heatmap

Exposure Snapshot

Top Exposed Assets

Service Inventory

Recent Scans

Port Intelligence

Live Aggregation

Vulnerability Scanner

Focused host and domain assessments with deep fingerprinting, CVE enrichment and role-based scoring.

Use this scanner only for authorized assets.

Latest Scan Findings

Network Discovery Scanner

CIDR subnet enumeration • Host discovery • Service mapping • Authorized networks only

Hosts Alive
Ports Open
Services
Risk Score
Suggested ranges:

Network scanner requires nmap and is intended exclusively for authorized lab or private networks.

Network Scan Results

Stealth & Intel Scanner

Low-noise probing • Passive metadata enrichment • No evasion — not a bypass tool

⚠️ Stealth mode is low-noise only. It does NOT bypass SIEM, IDS, or security monitoring systems.

Stealth Scan Results

Aggregated Findings

Scan History

Workspace Preferences

Preferences are stored in the browser and applied instantly across the workspace.

Operational Notes

  • Findings are deduplicated per project, asset and vulnerability key.
  • Dashboard metrics now separate unique host-port exposures from repeated scans.
  • Network suggestions are only shown where CIDR scanning is meaningful.
  • Stealth mode remains low-noise only and does not attempt monitoring bypass.
  • For Vercel Postgres set DATABASE_URL and install psycopg in requirements.
  • For MongoDB Atlas on Vercel set MONGODB_URI and optional MONGODB_DB_NAME.

Scanner Reference

Risk Scanner Use for single hosts and domains when you want broad port, version and HTTP security coverage.
Network Discovery Use on authorized private networks to enumerate hosts, services and exposed surface by subnet. Access via the Network tab.
Stealth & Intel Low-noise profiling and passive metadata collection. Access via the Stealth tab.