Skip to main content

Vulnerability Management

The vulnerability management module combines network scanning, CVE intelligence from multiple feeds, AI-powered triage, patch management, and remediation tracking into a single workflow.

Dashboard

The main dashboard (/) shows a real-time security posture overview:

MetricDescription
Total VulnerabilitiesAll open findings across all scanned platforms
Critical VulnerabilitiesFindings rated Critical severity
Dependencies TrackedSoftware dependencies inventoried across platforms
Scan Coverage %Percentage of registered platforms with recent scan data
Security Posture ScoreComposite 0–100 score (green ≥80, amber ≥60, red below 60)
30-Day Vulnerability TrendBar chart of daily vuln counts by severity
Platform Risk ScoresPer-platform risk score with color-coded bars

A zero-day alert banner appears at the top when a newly disclosed CVE matches your tracked dependencies.

Network Scans

Navigate to Vulnerability Management → Network Scans.

Scan Types

TypeDescription
FullComprehensive scan of all hosts and services in the target range
QuickFaster surface-level scan; good for daily coverage checks
TargetedSpecific hosts or IP range
CustomUser-defined scope and settings

Creating a Scan

Click New Scan and provide:

FieldRequiredDescription
NameYesDescriptive name (e.g., "Acme Corp — Internal Network")
DescriptionNoOptional notes
Target RangeYesCIDR notation or hostname (e.g., 192.168.1.0/24, 10.0.0.0/8)
Scan TypeYesFull, Quick, Targeted, or Custom

Scan Lifecycle

Pending → Running → Completed / Failed

Click Run Scan on any pending, completed, or failed scan to trigger a new execution. Running scans show a "Running..." indicator and cannot be re-triggered until they complete.

Vulnerability Library

Navigate to Vulnerabilities to see all findings across your scanned platforms.

CVE Intelligence Sources

Vulnerability data is enriched from four background collectors that run continuously:

SourceData Provided
NVD (NIST National Vulnerability Database)CVE descriptions, CVSS scores, affected products
OSV (Open Source Vulnerabilities)Open source package vulnerabilities
GHSA (GitHub Security Advisories)Ecosystem-specific advisories for npm, PyPI, Go, etc.
KEV (CISA Known Exploited Vulnerabilities)CVEs with confirmed real-world exploitation
EPSSExploit Prediction Scoring System probability scores (0–1)

A CVE is cached at the global level once and reused across all tenants — NVD is not queried per customer.

Severity Levels

SeverityCVSS Range
Critical9.0–10.0
High7.0–8.9
Medium4.0–6.9
Low0.1–3.9
💡Prioritize vulnerabilities that appear in the CISA KEV list — these have confirmed exploitation in the wild and should be patched immediately regardless of CVSS score.

AI Vulnerability Triage

Navigate to Vulnerability Management → AI Triage.

The AI triage engine uses Claude to analyze vulnerabilities and produce:

OutputDescription
Executive SummaryBusiness-impact explanation in plain language
Technical AnalysisDetailed attack surface, prerequisites, and exploitation details
Remediation StepsSpecific, actionable fix instructions

Triage Methods

Single triage — Enter a vulnerability ID and click Triage for immediate AI analysis of that specific finding.

Batch triage — Click Batch Triage to analyze all open vulnerabilities in the background. Results appear in the "Recent Triage Results" list.

Remediation Plan — Click Generate Remediation Plan to produce a prioritized, consolidated remediation roadmap across all open vulnerabilities.

Patch Management

Navigate to Vulnerability Management → Patch Management to track the status of patches for identified vulnerabilities. Patch approval workflow and deployment status are tracked per finding.

Remediation Tracking

Navigate to Vulnerability Management → Remediation to assign remediation tasks, set due dates, upload evidence, and track progress toward closure.

Vulnerability Exceptions

Navigate to Vulnerability Management → Exceptions to manage risk acceptances:

  • Accept risk on a specific CVE for a defined period
  • Document business justification
  • Set expiry date (vulnerability is re-assessed after expiry)
  • Exception lifecycle: Open → Expired → Re-assessed

Dependencies

Navigate to Dependencies to view all software packages and libraries inventoried from connected GitHub repositories, mapped to known CVEs.

ℹ️The vulnerability scanner uses ZAP for DAST and Nuclei for template-based scanning. Scans run in isolated Azure Container Instances and results are posted back via webhook.