扫描报告
15 /100
net-vuln-scan
网络安全漏洞检测工具 - 端口扫描、弱密码检测、SSL证书检测、CVE漏洞检测
This is a legitimate network security vulnerability scanner with fully documented capabilities. Cloud metadata service access is intentionally used for SSRF detection, not credential exfiltration.
可以安装
Approve for use. The skill provides documented security scanning capabilities without malicious behavior. Monitor cloud metadata service interactions if deployed in production cloud environments.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Cloud Metadata Service Access 敏感访问 | scripts/platform_check.py:255 |
| 低危 | Redis Authentication Check 敏感访问 | scripts/weakpass_check.py:102 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 网络访问 | READ | READ | ✓ 一致 | All scripts use socket connections for port scanning |
| 命令执行 | NONE | READ | ✓ 一致 | cve_check.py:52-68 uses subprocess for Windows registry queries |
| 文件系统 | NONE | WRITE | ✓ 一致 | report_gen.py:167-215 writes HTML/JSON reports |
1 高危 13 项发现
高危 IP 地址 硬编码 IP 地址
169.254.169.254 references/platform_vulnerabilities_2026.md:418 中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 references/latest_vulnerabilities_2026.md:66 中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262 references/latest_vulnerabilities_2026.md:113 中危 外部 URL 外部 URL
https://dotnet.microsoft.com/download/dotnet references/latest_vulnerabilities_2026.md:146 中危 外部 URL 外部 URL
https://www.cisa.gov/known-exploited-vulnerabilities-catalog references/latest_vulnerabilities_2026.md:250 中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar references/latest_vulnerabilities_2026.md:251 中危 外部 URL 外部 URL
http://169.254.169.254/latest/meta-data/ references/platform_vulnerabilities_2026.md:418 中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide references/platform_vulnerabilities_2026.md:437 中危 外部 URL 外部 URL
https://nvd.nist.gov references/platform_vulnerabilities_2026.md:438 中危 外部 URL 外部 URL
https://www.zerodayinitiative.com references/platform_vulnerabilities_2026.md:439 中危 外部 URL 外部 URL
https://www.tenable.com/blog references/platform_vulnerabilities_2026.md:440 中危 外部 URL 外部 URL
http://127.0.0.1 scripts/platform_check.py:220 中危 外部 URL 外部 URL
http://169.254.169.254/metadata/instance scripts/platform_check.py:261 目录结构
13 文件 · 79.5 KB · 2921 行 Python 6f · 1549L
Markdown 7f · 1372L
├─
▾
references
│ ├─
examples.md
Markdown
│ ├─
latest_vulnerabilities_2026.md
Markdown
│ ├─
platform_vulnerabilities_2026.md
Markdown
│ ├─
port_scan_guide.md
Markdown
│ ├─
ssl_check_guide.md
Markdown
│ └─
weakpass_guide.md
Markdown
├─
▾
scripts
│ ├─
cve_check.py
Python
│ ├─
platform_check.py
Python
│ ├─
port_scan.py
Python
│ ├─
report_gen.py
Python
│ ├─
ssl_check.py
Python
│ └─
weakpass_check.py
Python
└─
SKILL.md
Markdown
安全亮点
✓ All capabilities are fully documented in SKILL.md
✓ No credential harvesting or exfiltration detected
✓ No obfuscation or base64-encoded payloads
✓ No reverse shell or C2 communication
✓ No unauthorized access to ~/.ssh, ~/.aws, or .env files
✓ Uses standard Python libraries (socket, ssl, subprocess, urllib)
✓ Legitimate security scanning tool for authorized vulnerability assessment
✓ Clear documentation with usage restrictions and ethical guidelines