Low Risk — Risk Score 15/100
Last scan:20 hr ago Rescan
15 /100
net-vuln-scan
网络安全漏洞检测工具 - 端口扫描、弱密码检测、SSL证书检测、CVE漏洞检测
This is a legitimate network security vulnerability scanner with fully documented capabilities. Cloud metadata service access is intentionally used for SSRF detection, not credential exfiltration.
Skill Namenet-vuln-scan
Duration57.4s
Enginepi
Safe to install
Approve for use. The skill provides documented security scanning capabilities without malicious behavior. Monitor cloud metadata service interactions if deployed in production cloud environments.

Findings 2 items

Severity Finding Location
Low
Cloud Metadata Service Access Sensitive Access
Tool accesses 169.254.169.254 (AWS/Azure metadata endpoint) to detect SSRF vulnerabilities. This is documented behavior for cloud security assessment, not credential theft.
urllib.request.Request('http://169.254.169.254/latest/meta-data/')
→ This is legitimate SSRF detection as documented. Consider monitoring in production cloud environments.
scripts/platform_check.py:255
Low
Redis Authentication Check Sensitive Access
Tool sends Redis PING command to test if authentication is required. This is a passive security check, not a brute force attack.
sock.send(b'*1\r\n$4\r\nPING\r\n')
→ This is standard security scanning practice. No credential harvesting occurs.
scripts/weakpass_check.py:102
ResourceDeclaredInferredStatusEvidence
Network READ READ ✓ Aligned All scripts use socket connections for port scanning
Shell NONE READ ✓ Aligned cve_check.py:52-68 uses subprocess for Windows registry queries
Filesystem NONE WRITE ✓ Aligned report_gen.py:167-215 writes HTML/JSON reports
1 High 13 findings
📡
High IP Address 硬编码 IP 地址
169.254.169.254
references/platform_vulnerabilities_2026.md:418
🔗
Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514
references/latest_vulnerabilities_2026.md:66
🔗
Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262
references/latest_vulnerabilities_2026.md:113
🔗
Medium External URL 外部 URL
https://dotnet.microsoft.com/download/dotnet
references/latest_vulnerabilities_2026.md:146
🔗
Medium External URL 外部 URL
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
references/latest_vulnerabilities_2026.md:250
🔗
Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar
references/latest_vulnerabilities_2026.md:251
🔗
Medium External URL 外部 URL
http://169.254.169.254/latest/meta-data/
references/platform_vulnerabilities_2026.md:418
🔗
Medium External URL 外部 URL
https://msrc.microsoft.com/update-guide
references/platform_vulnerabilities_2026.md:437
🔗
Medium External URL 外部 URL
https://nvd.nist.gov
references/platform_vulnerabilities_2026.md:438
🔗
Medium External URL 外部 URL
https://www.zerodayinitiative.com
references/platform_vulnerabilities_2026.md:439
🔗
Medium External URL 外部 URL
https://www.tenable.com/blog
references/platform_vulnerabilities_2026.md:440
🔗
Medium External URL 外部 URL
http://127.0.0.1
scripts/platform_check.py:220
🔗
Medium External URL 外部 URL
http://169.254.169.254/metadata/instance
scripts/platform_check.py:261

File Tree

13 files · 79.5 KB · 2921 lines
Python 6f · 1549L Markdown 7f · 1372L
├─ 📁 references
│ ├─ 📝 examples.md Markdown 174L · 3.0 KB
│ ├─ 📝 latest_vulnerabilities_2026.md Markdown 251L · 6.2 KB
│ ├─ 📝 platform_vulnerabilities_2026.md Markdown 440L · 10.7 KB
│ ├─ 📝 port_scan_guide.md Markdown 68L · 1.7 KB
│ ├─ 📝 ssl_check_guide.md Markdown 102L · 2.2 KB
│ └─ 📝 weakpass_guide.md Markdown 142L · 2.6 KB
├─ 📁 scripts
│ ├─ 🐍 cve_check.py Python 236L · 7.0 KB
│ ├─ 🐍 platform_check.py Python 416L · 12.8 KB
│ ├─ 🐍 port_scan.py Python 150L · 4.6 KB
│ ├─ 🐍 report_gen.py Python 224L · 8.4 KB
│ ├─ 🐍 ssl_check.py Python 250L · 7.9 KB
│ └─ 🐍 weakpass_check.py Python 273L · 7.4 KB
└─ 📝 SKILL.md Markdown 195L · 5.1 KB

Security Positives

✓ All capabilities are fully documented in SKILL.md
✓ No credential harvesting or exfiltration detected
✓ No obfuscation or base64-encoded payloads
✓ No reverse shell or C2 communication
✓ No unauthorized access to ~/.ssh, ~/.aws, or .env files
✓ Uses standard Python libraries (socket, ssl, subprocess, urllib)
✓ Legitimate security scanning tool for authorized vulnerability assessment
✓ Clear documentation with usage restrictions and ethical guidelines