Scan Report
15 /100
net-vuln-scan
网络安全漏洞检测工具 - 端口扫描、弱密码检测、SSL证书检测、CVE漏洞检测
This is a legitimate network security vulnerability scanner with fully documented capabilities. Cloud metadata service access is intentionally used for SSRF detection, not credential exfiltration.
Safe to install
Approve for use. The skill provides documented security scanning capabilities without malicious behavior. Monitor cloud metadata service interactions if deployed in production cloud environments.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Cloud Metadata Service Access Sensitive Access | scripts/platform_check.py:255 |
| Low | Redis Authentication Check Sensitive Access | scripts/weakpass_check.py:102 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | All scripts use socket connections for port scanning |
| Shell | NONE | READ | ✓ Aligned | cve_check.py:52-68 uses subprocess for Windows registry queries |
| Filesystem | NONE | WRITE | ✓ Aligned | report_gen.py:167-215 writes HTML/JSON reports |
1 High 13 findings
High IP Address 硬编码 IP 地址
169.254.169.254 references/platform_vulnerabilities_2026.md:418 Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 references/latest_vulnerabilities_2026.md:66 Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262 references/latest_vulnerabilities_2026.md:113 Medium External URL 外部 URL
https://dotnet.microsoft.com/download/dotnet references/latest_vulnerabilities_2026.md:146 Medium External URL 外部 URL
https://www.cisa.gov/known-exploited-vulnerabilities-catalog references/latest_vulnerabilities_2026.md:250 Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar references/latest_vulnerabilities_2026.md:251 Medium External URL 外部 URL
http://169.254.169.254/latest/meta-data/ references/platform_vulnerabilities_2026.md:418 Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide references/platform_vulnerabilities_2026.md:437 Medium External URL 外部 URL
https://nvd.nist.gov references/platform_vulnerabilities_2026.md:438 Medium External URL 外部 URL
https://www.zerodayinitiative.com references/platform_vulnerabilities_2026.md:439 Medium External URL 外部 URL
https://www.tenable.com/blog references/platform_vulnerabilities_2026.md:440 Medium External URL 外部 URL
http://127.0.0.1 scripts/platform_check.py:220 Medium External URL 外部 URL
http://169.254.169.254/metadata/instance scripts/platform_check.py:261 File Tree
13 files · 79.5 KB · 2921 lines Python 6f · 1549L
Markdown 7f · 1372L
├─
▾
references
│ ├─
examples.md
Markdown
│ ├─
latest_vulnerabilities_2026.md
Markdown
│ ├─
platform_vulnerabilities_2026.md
Markdown
│ ├─
port_scan_guide.md
Markdown
│ ├─
ssl_check_guide.md
Markdown
│ └─
weakpass_guide.md
Markdown
├─
▾
scripts
│ ├─
cve_check.py
Python
│ ├─
platform_check.py
Python
│ ├─
port_scan.py
Python
│ ├─
report_gen.py
Python
│ ├─
ssl_check.py
Python
│ └─
weakpass_check.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ All capabilities are fully documented in SKILL.md
✓ No credential harvesting or exfiltration detected
✓ No obfuscation or base64-encoded payloads
✓ No reverse shell or C2 communication
✓ No unauthorized access to ~/.ssh, ~/.aws, or .env files
✓ Uses standard Python libraries (socket, ssl, subprocess, urllib)
✓ Legitimate security scanning tool for authorized vulnerability assessment
✓ Clear documentation with usage restrictions and ethical guidelines