低风险 — 风险评分 15/100
上次扫描:20 小时前 重新扫描
15 /100
net-vuln-scan
网络安全漏洞检测工具 - 端口扫描、弱密码检测、SSL证书检测、CVE漏洞检测
This is a legitimate network security vulnerability scanner with fully documented capabilities. Cloud metadata service access is intentionally used for SSRF detection, not credential exfiltration.
技能名称net-vuln-scan
分析耗时57.4s
引擎pi
可以安装
Approve for use. The skill provides documented security scanning capabilities without malicious behavior. Monitor cloud metadata service interactions if deployed in production cloud environments.

安全发现 2 项

严重性 安全发现 位置
低危
Cloud Metadata Service Access 敏感访问
Tool accesses 169.254.169.254 (AWS/Azure metadata endpoint) to detect SSRF vulnerabilities. This is documented behavior for cloud security assessment, not credential theft.
urllib.request.Request('http://169.254.169.254/latest/meta-data/')
→ This is legitimate SSRF detection as documented. Consider monitoring in production cloud environments.
scripts/platform_check.py:255
低危
Redis Authentication Check 敏感访问
Tool sends Redis PING command to test if authentication is required. This is a passive security check, not a brute force attack.
sock.send(b'*1\r\n$4\r\nPING\r\n')
→ This is standard security scanning practice. No credential harvesting occurs.
scripts/weakpass_check.py:102
资源类型声明权限推断权限状态证据
网络访问 READ READ ✓ 一致 All scripts use socket connections for port scanning
命令执行 NONE READ ✓ 一致 cve_check.py:52-68 uses subprocess for Windows registry queries
文件系统 NONE WRITE ✓ 一致 report_gen.py:167-215 writes HTML/JSON reports
1 高危 13 项发现
📡
高危 IP 地址 硬编码 IP 地址
169.254.169.254
references/platform_vulnerabilities_2026.md:418
🔗
中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514
references/latest_vulnerabilities_2026.md:66
🔗
中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262
references/latest_vulnerabilities_2026.md:113
🔗
中危 外部 URL 外部 URL
https://dotnet.microsoft.com/download/dotnet
references/latest_vulnerabilities_2026.md:146
🔗
中危 外部 URL 外部 URL
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
references/latest_vulnerabilities_2026.md:250
🔗
中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar
references/latest_vulnerabilities_2026.md:251
🔗
中危 外部 URL 外部 URL
http://169.254.169.254/latest/meta-data/
references/platform_vulnerabilities_2026.md:418
🔗
中危 外部 URL 外部 URL
https://msrc.microsoft.com/update-guide
references/platform_vulnerabilities_2026.md:437
🔗
中危 外部 URL 外部 URL
https://nvd.nist.gov
references/platform_vulnerabilities_2026.md:438
🔗
中危 外部 URL 外部 URL
https://www.zerodayinitiative.com
references/platform_vulnerabilities_2026.md:439
🔗
中危 外部 URL 外部 URL
https://www.tenable.com/blog
references/platform_vulnerabilities_2026.md:440
🔗
中危 外部 URL 外部 URL
http://127.0.0.1
scripts/platform_check.py:220
🔗
中危 外部 URL 外部 URL
http://169.254.169.254/metadata/instance
scripts/platform_check.py:261

目录结构

13 文件 · 79.5 KB · 2921 行
Python 6f · 1549L Markdown 7f · 1372L
├─ 📁 references
│ ├─ 📝 examples.md Markdown 174L · 3.0 KB
│ ├─ 📝 latest_vulnerabilities_2026.md Markdown 251L · 6.2 KB
│ ├─ 📝 platform_vulnerabilities_2026.md Markdown 440L · 10.7 KB
│ ├─ 📝 port_scan_guide.md Markdown 68L · 1.7 KB
│ ├─ 📝 ssl_check_guide.md Markdown 102L · 2.2 KB
│ └─ 📝 weakpass_guide.md Markdown 142L · 2.6 KB
├─ 📁 scripts
│ ├─ 🐍 cve_check.py Python 236L · 7.0 KB
│ ├─ 🐍 platform_check.py Python 416L · 12.8 KB
│ ├─ 🐍 port_scan.py Python 150L · 4.6 KB
│ ├─ 🐍 report_gen.py Python 224L · 8.4 KB
│ ├─ 🐍 ssl_check.py Python 250L · 7.9 KB
│ └─ 🐍 weakpass_check.py Python 273L · 7.4 KB
└─ 📝 SKILL.md Markdown 195L · 5.1 KB

安全亮点

✓ All capabilities are fully documented in SKILL.md
✓ No credential harvesting or exfiltration detected
✓ No obfuscation or base64-encoded payloads
✓ No reverse shell or C2 communication
✓ No unauthorized access to ~/.ssh, ~/.aws, or .env files
✓ Uses standard Python libraries (socket, ssl, subprocess, urllib)
✓ Legitimate security scanning tool for authorized vulnerability assessment
✓ Clear documentation with usage restrictions and ethical guidelines