| Tool | PCI Requirement | Purpose |
|---|---|---|
| Port & Service Scanner | 1.2.1 | Scan targets with nmap or import XML results to inventory open ports and services |
| SSL/TLS Checker | 4.2.1 | Validate certificate grades, protocols, and cipher suites |
| CVE Lookup + EPSS | 6.3 | Search the NVD for known vulnerabilities with exploit probability scores |
| ASV Scan Import | 11.3.2 | Upload and parse Qualys/Tenable/Rapid7 scan results |
| Patch Management | 6.3.3 | Upload WSUS/SCCM/Qualys CSV reports to verify patch compliance |
| Log Audit Validator | 10.2 | Upload log samples to verify required audit trail fields are present |
| Access Review | 7.2.1, 7.2.5, 8.6.1 | Upload AD/Azure AD/AWS IAM exports to detect access control issues |
| Pen Test Parser | 11.4 | Upload and parse Burp Suite, Nessus, or ZAP reports |
| Headers & DNS | 2.2.5 | Check HTTP security headers and DNS records |
| Payment Page Script Monitor | 11.6.1 | Live-scan payment pages or import script inventories to verify SRI and CSP controls |
| Firewall Rule Analyzer | 1.2.5, 1.3.1, 1.3.2 | Upload firewall rule exports to detect any-any rules, deprecated protocols, and overly broad CIDRs |
| Password Policy Analyzer | 8.3.6, 8.3.7, 8.3.9 | Upload AD GPO, Azure AD, AWS IAM, or CSV policy exports and check against PCI password requirements |
| CISA KEV Tracker | 6.3, 11.3 | Track CISA Known Exploited Vulnerabilities catalog with search, ransomware filter, and vendor breakdown |
| Secret Scanner | 6.2, 6.3 | Scan public Git repositories for leaked secrets, API keys, and credentials using Gitleaks |
| Credential Leak Monitor | 8.3, 8.6 | Check domains and companies against the Have I Been Pwned breach database |
| Threat Briefing | 6.3, 11.3 | Aggregated threat intelligence from NVD, CISA KEV, EPSS, and HIBP sources |
| Anti-Malware Deployment Checker | 5.2.1, 5.3.1, 5.3.2 | Upload endpoint protection reports to verify agent deployment, signature freshness, and real-time protection |
| FIM Report Parser | 11.5.1, 11.5.2 | Upload file integrity monitoring reports to identify unauthorized changes to critical system files |
| Remediation Dashboard | — | Aggregated view of all findings across all tools |
Accessing Security Tools
Open the Security Tools Tab
Port & Service Scanner
The Port & Service Scanner inventories open ports and running services on target hosts. It supports live nmap scanning directly from Kliper and importing existing nmap XML output files.Running a Live Scan
Switch to Live Scan Mode
Enter a Target
192.168.1.0/24) in the input field.Click Start Scan
-sV -sS --open). Scans typically complete in 30–120 seconds depending on the target range.Review Results
| Field | Description |
|---|---|
| Hosts | Number of live hosts discovered |
| Open Ports | Total number of open ports across all hosts |
| PCI Issues | Count of risky ports/services flagged |
| PCI Compliance | PASS or FAIL badge |
Importing nmap XML
Switch to the Import XML toggle, then select an nmap XML output file. The parser extracts the same host, port, service, and version data as a live scan.Risky Port Detection
The scanner flags these commonly risky ports and services:| Port | Service | Risk |
|---|---|---|
| 21 | FTP | Unencrypted file transfer |
| 23 | Telnet | Unencrypted remote access |
| 445 | SMB | File sharing — common attack vector |
| 3306 | MySQL | Database exposed externally |
| 3389 | RDP | Remote desktop — brute force target |
| 5432 | PostgreSQL | Database exposed externally |
| 6379 | Redis | In-memory store — often unauthenticated |
SSL/TLS Checker
The SSL/TLS Checker validates a domain’s certificate configuration and assigns a letter grade (A through F). It uses SSL Labs for detailed analysis with a direct TLS fallback when SSL Labs is unavailable.Running a Check
Enter the Domain
example.com) in the input field. Do not include https:// — the checker adds it automatically.Click Run Check
Review Results
| Field | Description |
|---|---|
| Grade | Letter grade badge (A+, A, B, C, D, F) color-coded green through red |
| PCI Compliance | PASS or FAIL badge — FAIL if grade is below B, TLS < 1.2, or weak ciphers detected |
| Certificate Issuer | The certificate authority (e.g., Let’s Encrypt, DigiCert) |
| Valid Until | Certificate expiration date |
| Protocol | Supported TLS versions |
| Cipher Suite | Active cipher suites |
| PCI Issues | Specific problems that affect PCI compliance (e.g., “TLS 1.0 enabled”, “Weak cipher suites”) |
Check History
Previous checks are listed below the input form with the domain, grade, date, and PCI status. Expand any previous check to view its full results or re-apply it to the assessment.CVE Vulnerability Lookup
The CVE Lookup tool searches the NIST National Vulnerability Database (NVD) for known vulnerabilities affecting a specific software product and version. Results are cached locally to reduce API calls and improve response times.Searching for Vulnerabilities
Enter Product and Version
Apache HTTP Server) and version (e.g., 2.4.49) in the input fields.Click Search
Review CVEs
| Field | Description |
|---|---|
| CVE ID | The unique identifier (e.g., CVE-2021-41773) |
| Severity | Color-coded badge — Critical (red), High (orange), Medium (yellow), Low (blue) |
| CVSS Score | Numerical score from 0.0 to 10.0 |
| Description | Summary of the vulnerability |
| Published | Date the CVE was published |
Lookup History
All previous lookups are displayed below the search form with product, version, CVE count, and date. Expand any previous lookup to review its results or re-apply to the assessment.Patch Management
The Patch Management tool parses CSV exports from patch management systems — WSUS, SCCM, Qualys, and generic formats — to verify that security patches are applied within PCI DSS timelines.Uploading a Patch Report
Select the CSV File
.csv file exported from your patch management tool.Automatic Vendor Detection
| Vendor | Detection Method | Key Columns |
|---|---|---|
| WSUS | UpdateTitle or KBArticle header | UpdateTitle, KBArticle, MsrcSeverity, ReleaseDate, Status |
| SCCM | CI_UniqueID or ComplianceState header | Title, ArticleID, Severity, ComplianceState |
| Qualys | QID and Patch headers | QID, Title, Severity, Status |
| Generic | Fallback | Best-effort column matching for patch name, severity, status, dates |
Review Results
| Field | Description |
|---|---|
| Total Patches | Number of patches in the report |
| Missing Critical | Count of uninstalled critical patches |
| Missing High | Count of uninstalled high-severity patches |
| Overdue (>30d) | Patches not installed within 30 days of release |
| Vendor | Detected patch management vendor |
| PCI Compliance | PASS if no critical/high patches are overdue beyond 30 days |
Log Audit Validator
The Log Audit Validator analyzes log samples to verify that all six PCI DSS Requirement 10.2 audit trail fields are present. It supports syslog (RFC 3164 and 5424), Windows Event XML, Windows Event CSV, JSON lines, and generic CSV formats.Uploading a Log Sample
Automatic Format Detection
| Format | Detection Method |
|---|---|
| Syslog (RFC 3164) | Lines starting with timestamp pattern Mon DD HH:MM:SS |
| Syslog (RFC 5424) | Lines starting with <pri>version and ISO 8601 timestamps |
| Windows Event XML | Contains <Event> or <EventData> tags |
| Windows Event CSV | CSV with EventID and Source/Level columns |
| JSON Lines | Lines starting with { that parse as valid JSON |
| Generic CSV | CSV with comma-separated values and a header row |
Review Results
| Required Field | PCI Reference | What It Looks For |
|---|---|---|
| User Identification | 10.2.1 | Username, UID, account name, actor |
| Event Type / Action | 10.2.1 | Event ID, action, category, facility |
| Date and Time | 10.2.1 | Timestamps in ISO 8601, syslog, or epoch format |
| Success / Failure | 10.2.1 | Status codes, success/failure/denied keywords |
| Event Origination | 10.2.1 | Source IP, client address, hostname |
| Affected Resource | 10.2.1 | Target object, destination, file path, endpoint |
Access Review
The Access Review tool parses user account exports from identity providers to detect inactive accounts, shared/generic accounts, excessive privileges, and missing MFA — all key requirements under PCI DSS Requirements 7 and 8.Uploading a User Export
Select the CSV File
.csv file exported from your directory service or identity provider.Automatic Source Detection
| Source | Detection Method | Key Columns |
|---|---|---|
| Active Directory | SamAccountName or LastLogonDate header | SamAccountName, Enabled, LastLogonDate, PasswordLastSet, MemberOf |
| Azure AD | UserPrincipalName or AccountEnabled header | UserPrincipalName, AccountEnabled, LastSignInDateTime, AssignedRoles, MFAStatus |
| AWS IAM | arn and password_last_used headers | user, arn, password_enabled, password_last_used, mfa_active |
| Generic | Fallback | Best-effort column matching for username, status, last login, groups, MFA |
Review Results
| Metric | Description |
|---|---|
| Total Accounts | Number of user accounts in the export |
| Inactive (>90d) | Enabled accounts with no login in over 90 days (violates Req 8.1.4) |
| Shared Accounts | Generic/shared accounts like admin, test, service (violates Req 8.5) |
| Elevated Access | Accounts with admin/privileged roles (review per Req 7.2.1) |
| No MFA | Accounts without multi-factor authentication (violates Req 8.4.2) |
Apply to Requirements
| Requirement | What Is Filled |
|---|---|
| 7.2.1 | Access privileges assigned based on job classification and function |
| 7.2.5 | Access privileges reviewed at least semi-annually |
| 8.6.1 | System or application accounts managed based on least privilege |
Finding Types and Risk Levels
| Finding | Risk Level | PCI Reference |
|---|---|---|
| No MFA on admin account | Critical | 8.4.2 |
| Inactive account (>90 days) | High | 8.1.4 |
| Shared/generic account | High | 8.5 |
| No MFA (non-admin) | High | 8.4.2 |
| Excessive privilege | Medium | 7.2.1 |
| Password expired (>90 days) | Medium | 8.3.9 |
ASV Scan Import
The ASV Scan Import tool parses CSV exports from Approved Scanning Vendors — Qualys, Tenable (Nessus), and Rapid7 — and converts them into structured findings with PCI compliance determination.Uploading a Scan
Fill In Scan Details
- Scan Date — when the scan was performed
- Quarter — the PCI quarter this scan covers (e.g., Q1 2026)
- Vendor — select Qualys, Tenable, Rapid7, or Generic (auto-detected if left as Auto)
Select the CSV File
.csv file exported from your ASV scanning tool.Click Upload & Parse
Review Results
- PASS / FAIL badge — FAIL if any finding has CVSS score >= 4.0
- Host count — number of unique hosts scanned
- Vulnerability count — total number of findings
- Severity breakdown — badge counts for Critical, High, Medium, Low, Info
Supported Vendor Formats
| Vendor | Detection Method | Key Columns |
|---|---|---|
| Qualys | Column header contains QID | IP, DNS, QID, Title, Severity, CVSS, Port, Protocol, CVE ID, PCI Vuln |
| Tenable (Nessus) | Column header contains Plugin ID | Plugin ID, CVE, CVSS, Risk, Host, Port, Name, Synopsis, Solution |
| Rapid7 | Column header contains Vulnerability ID | Vulnerability ID, Asset IP, Asset Names, Severity, CVSS Score, Title |
| Generic CSV | Fallback format | Best-effort column matching — looks for host, port, severity, cvss, title, description |
Managing Findings
Expand a scan result to view all findings. Each finding row displays:- Severity badge — color-coded (Critical, High, Medium, Low, Info)
- Title — vulnerability name
- Host and Port — affected asset
- CVSS Score — numerical risk score
- Remediation Status — dropdown to mark as Open, In Progress, Fixed, or Accepted Risk
- False Positive — toggle to flag false positives (excluded from compliance calculation)
Penetration Test Parser
The Pen Test Parser imports results from common penetration testing tools and normalizes findings into a unified format. It supports three major formats and a generic CSV fallback.Uploading Test Results
Fill In Test Details
- Test Type — External, Internal, or Segmentation
- Test Date — when the test was performed
- Tester Name — the person or firm that conducted the test
- Tool — select Burp Suite, Nessus, OWASP ZAP, or Generic (leave as Auto-detect for automatic format detection)
Select the Report File
.xml or .csv file exported from the penetration testing tool.Click Upload & Parse
| Format | Detection |
|---|---|
| Burp Suite XML | .xml file with <issues> root element |
| OWASP ZAP XML | .xml file with <OWASPZAPReport> root element |
| Nessus CSV | .csv file with Plugin ID column header |
| Generic CSV | .csv file — best-effort column matching |
Review Results
- PASS / FAIL badge — FAIL if any Critical or High findings exist
- Tool detected — which parser was used (Burp, Nessus, ZAP, Generic)
- Test type — External, Internal, or Segmentation
- Severity breakdown — badge counts for High, Medium, Low
Apply to Requirement
| Test Type | Target Sub-Requirement |
|---|---|
| External | 11.4.3 (External penetration testing) |
| Internal | 11.4.2 (Internal penetration testing) |
| Segmentation | 11.4.5 (Segmentation penetration testing) |
Managing Findings
Expand a result to view all findings with severity filter and pagination. Each finding displays:- Severity badge — High (orange), Medium (yellow), Low (blue)
- Title — vulnerability name
- Host — target URL or IP
- Confidence — Certain, Firm, or Tentative
- Remediation Status — dropdown to track fix progress
- Expandable detail — full description and recommended remediation (click the finding row)
HTTP Header & DNS Checker
The Header & DNS Checker validates HTTP security headers and DNS security records for a domain, assigning a letter grade (A through F) and identifying PCI-relevant configuration gaps. All checks run server-side using Node.js built-ins — no external API dependencies.Running a Check
Click Run Check
- HTTP headers — makes an HTTPS request to the domain and evaluates the response headers
- DNS records — queries DNS for SPF, DMARC, and CAA records
HTTP Security Headers
| Header | Expected Value | Status if Missing |
|---|---|---|
| Strict-Transport-Security (HSTS) | Present with max-age >= 31,536,000 | Fail |
| Content-Security-Policy (CSP) | Present (warn if contains unsafe-inline or unsafe-eval) | Fail |
| X-Content-Type-Options | nosniff | Fail |
| X-Frame-Options | DENY or SAMEORIGIN | Fail |
| Referrer-Policy | Present | Warn |
| Permissions-Policy | Present | Warn |
| Cache-Control | Contains no-store or no-cache | Warn |
DNS Security Records
| Record | What Is Checked | Status if Missing |
|---|---|---|
| SPF | TXT record starting with v=spf1 | Warn |
| DMARC | TXT record at _dmarc.{domain} | Warn |
| CAA | Certificate Authority Authorization records | Warn |
Grading
The overall grade is calculated from the pass/warn/fail distribution:| Grade | Condition |
|---|---|
| A | All checks pass |
| B | All checks pass or warn (no failures) |
| C | 1–2 failed checks |
| D | 3 or more failed checks |
| F | Critical failures (missing HSTS or missing CSP) |
PCI Compliance
The check is marked PCI Fail if any of these critical headers are missing:- Strict-Transport-Security (HSTS)
- Content-Security-Policy (CSP)
- X-Frame-Options
Payment Page Script Monitor
The Payment Page Script Monitor addresses PCI DSS 4.0.1 Requirement 11.6.1 — a brand-new requirement that mandates monitoring and integrity verification of all scripts loaded on payment pages. The tool supports two modes: live scanning a URL and importing a CSV script inventory.Live Scanning a Payment Page
Enter the Payment Page URL
https://shop.example.com/checkout) in the URL input field.Click Scan URL
<script> tags, checks for Subresource Integrity (SRI) hashes, and inspects the Content-Security-Policy (CSP) header.Review Results
| Field | Description |
|---|---|
| Total Scripts | Number of scripts found on the page |
| Third-Party | Scripts loaded from external domains |
| Missing SRI | Scripts without integrity attribute |
| Unauthorized | Scripts not in the approved inventory |
| CSP Header | Whether a Content-Security-Policy header is present |
| PCI Compliance | PASS or FAIL badge |
Importing a Script Inventory
Switch to Import CSV mode to upload a CSV file with columns such asscript_url, domain, has_sri, approved, and notes. The system parses the inventory, detects third-party scripts, and evaluates compliance based on SRI and approval status.
PCI Compliance Logic
| Condition | Result |
|---|---|
| Third-party script without SRI integrity hash | FAIL |
| Script not approved in inventory | FAIL |
| No CSP header present | WARN |
| All scripts have SRI and are approved | PASS |
Firewall Rule Analyzer
The Firewall Rule Analyzer parses firewall rule exports and flags PCI-relevant violations such as any-any rules, deprecated protocols, overly broad CIDRs, and dangerous ports without source restriction.Uploading Firewall Rules
Select the Rules File
.txt, .conf, .xml, or .json file exported from your firewall.Automatic Format Detection
| Format | Detection Method |
|---|---|
| iptables | Lines starting with *filter, :INPUT, or -A |
| Cisco ACL | Lines containing access-list, permit, or deny |
| pfSense XML | Contains <filter> and <rule> XML elements |
| AWS Security Groups | JSON with SecurityGroups and IpPermissions keys |
Review Results
| Field | Description |
|---|---|
| Total Rules | Number of rules parsed |
| Allow Rules | Count of permit/accept rules |
| Deny Rules | Count of deny/drop/reject rules |
| Flagged | Count of rules with PCI violations |
| Format | Detected firewall format |
| PCI Compliance | PASS or FAIL badge |
Violation Types
| Violation | Risk Level | Description |
|---|---|---|
| Any-Any Rule | Critical | Rule allows all traffic from any source to any destination |
| Deprecated Protocol | High | Telnet (23), FTP (21), or TFTP (69) allowed |
| Dangerous Port | High | RDP (3389) or SMB (445) without source restriction |
| Broad CIDR | Medium | Allow rule with /8 or wider source/destination |
| No Default Deny | Medium | No explicit deny-all rule at the end of the chain |
Password Policy Analyzer
The Password Policy Analyzer checks password policy exports against PCI DSS 4.0.1 Requirements 8.3.6, 8.3.7, and 8.3.9. It supports exports from Active Directory Group Policy, Azure AD, AWS IAM, and generic CSV checklists.Uploading a Policy Export
Select the Policy File
.inf, .txt, .json, or .csv file exported from your identity provider.Automatic Source Detection
| Source | Detection Method | Key Fields |
|---|---|---|
| AD GPO | Lines matching MinimumPasswordLength = N pattern | MinimumPasswordLength, PasswordComplexity, PasswordHistorySize, MaximumPasswordAge, LockoutBadCount |
| Azure AD | JSON with PasswordPolicy or ConditionalAccess keys | MinimumLength, RequireUppercase, MaxPasswordAge, LockoutThreshold |
| AWS IAM | JSON with MinimumPasswordLength + RequireUppercaseCharacters | MinimumPasswordLength, RequireNumbers, MaxPasswordAge, PasswordReusePrevention |
| CSV Checklist | CSV with policy_name, value columns | Generic key-value pairs |
Review Results
| Check | PCI Requirement | Expected Value |
|---|---|---|
| Minimum length | 8.3.6 | 12 or more characters |
| Complexity (alpha + numeric) | 8.3.6 | Both required |
| Password history | 8.3.7 | Last 4 not reusable |
| Maximum age | 8.3.9 | 90 days or less |
| Lockout threshold | 8.3.4 | 10 or fewer attempts |
| Lockout duration | 8.3.4 | 30 minutes or more |
| First-login change | 8.3.9 | Required |
Anti-Malware Deployment Checker
The Anti-Malware Deployment Checker parses endpoint protection reports (CSV exports from AV/EDR tools) to verify agent deployment coverage, signature freshness, scan frequency, and real-time protection status across all endpoints.Uploading an Endpoint Report
Select the CSV File
.csv file exported from your endpoint protection platform.Automatic Vendor Detection
| Vendor | Detection Method | Key Columns |
|---|---|---|
| Windows Defender | AMRunningMode or Signature Date + Real-Time Protection headers | ComputerName, AMRunningMode, AntivirusSignatureLastUpdated, LastFullScanStartTime, RealTimeProtectionEnabled |
| CrowdStrike | AgentVersion + LastSeen headers | Hostname, Status, AgentVersion, LastSeen, OperatingSystem |
| SentinelOne | ThreatCount + IsActive headers | ComputerName, IsActive, AgentVersion, LastActiveDate, ScanStatus |
| Generic CSV | Fallback | hostname, agent_status, signature_date, last_scan, realtime_protection |
Review Results
| Field | Description |
|---|---|
| Total Endpoints | Number of endpoints in the report |
| Compliant | Endpoints with agent running, fresh signatures, and real-time protection enabled |
| Agents Down | Endpoints where the protection agent is not running |
| Signatures Outdated | Endpoints with signatures older than 7 days |
| Real-Time Disabled | Endpoints without real-time protection |
| Vendor | Detected AV/EDR vendor |
| PCI Compliance | PASS or FAIL badge |
PCI Compliance Logic
| Condition | Result |
|---|---|
| Agent not running on any endpoint | FAIL |
| Signatures older than 7 days | FAIL |
| Real-time protection disabled | FAIL |
| No scan in over 7 days | WARN |
| All endpoints: agent running + fresh signatures + real-time enabled | PASS |
AMRunningMode, AntivirusSignatureLastUpdated). Both formats are auto-detected.FIM Report Parser
The FIM (File Integrity Monitoring) Report Parser analyzes change logs from file integrity monitoring tools to identify unauthorized modifications to critical system files — a key control under PCI DSS Requirements 11.5.1 and 11.5.2.Uploading a FIM Report
Select the Report File
.json, .jsonl, .csv, .txt, or .log file exported from your FIM tool.Automatic Tool Detection
| Tool | Detection Method | Format |
|---|---|---|
| OSSEC / Wazuh | JSON with syscheck.path and syscheck.event fields | JSON lines |
| Tripwire | CSV with Object Name, Object Type, Severity columns | CSV |
| AIDE | Lines matching File: /path + Changed: ... pattern | Text report |
| Generic CSV | Fallback — columns like file_path, change_type, timestamp | CSV |
Review Results
| Field | Description |
|---|---|
| Total Changes | Number of file change events detected |
| Critical Changes | Changes to critical system files (see list below) |
| Unauthorized | Changes not marked as authorized |
| Authorized | Changes with an authorization record |
| Files Monitored | Total number of unique files in the report |
| Tool | Detected FIM tool |
| PCI Compliance | PASS or FAIL badge |
Critical File Detection
The parser flags modifications to these critical system files:| Platform | Critical Paths |
|---|---|
| Linux | /etc/passwd, /etc/shadow, /etc/sudoers, /etc/ssh/sshd_config, /boot/*, /usr/bin/sudo, /usr/sbin/*, /etc/crontab |
| Windows | C:\Windows\System32\*, boot.ini, ntoskrnl.exe, SAM, SECURITY, SYSTEM (registry hives) |
PCI Compliance Logic
| Condition | Result |
|---|---|
| Critical system file changed without authorization | FAIL |
| Any unauthorized file modification detected | FAIL |
| No FIM alerts at all (possible gap in monitoring coverage) | WARN |
| All changes authorized and critical files monitored | PASS |
CVE Lookup + EPSS Enrichment
The CVE Lookup tool now includes EPSS (Exploit Prediction Scoring System) enrichment from FIRST.org. Every CVE result is automatically enriched with its exploit probability score and percentile ranking, helping assessors prioritize vulnerabilities based on real-world exploitability — not just CVSS severity.What EPSS Adds
| Field | Description |
|---|---|
| EPSS Score | Probability (0–100%) that the CVE will be exploited in the wild within the next 30 days |
| EPSS Percentile | Ranking relative to all scored CVEs (e.g., 95th percentile = more exploitable than 95% of all CVEs) |
How It Works
When you search for a CVE or keyword, the tool:- Queries the NVD API v2 for vulnerability data (description, CVSS score, severity, references)
- Batch-queries the FIRST EPSS API for exploit probability scores for all returned CVEs
- Displays both CVSS and EPSS side-by-side in the results
CISA KEV Tracker
The CISA KEV (Known Exploited Vulnerabilities) Tracker lets you search and monitor CISA’s catalog of vulnerabilities that are confirmed to be actively exploited in the wild. This is critical for PCI DSS Requirements 6.3 (vulnerability management) and 11.3 (penetration testing scope).Features
Dashboard Stats
| Card | Description |
|---|---|
| Total KEVs | Total number of vulnerabilities in the CISA KEV catalog |
| Published (30 days) | KEVs added to the catalog in the last 30 days |
| Top Affected Vendor | Vendor with the most KEV entries |
Search
Recent KEVs
Ransomware Filter
KEV Entry Details
Each KEV entry card includes:| Field | Description |
|---|---|
| CVE ID | Linked to NVD detail page |
| CVSS Score | Severity badge (Critical/High/Medium/Low) |
| Vendor / Product | Affected software |
| Date Added | When CISA added it to the KEV catalog |
| Due Date | CISA’s required remediation deadline |
| Overdue | Orange badge if the due date has passed |
| Description | Vulnerability summary |
| Required Action | CISA’s recommended remediation action |
Secret Scanner
The Secret Scanner uses Gitleaks to scan public Git repositories for accidentally committed secrets — API keys, tokens, passwords, private keys, and other sensitive credentials. This supports PCI DSS Requirements 6.2 (secure development) and 6.3 (vulnerability management).Running a Scan
Enter Repository URL
https://github.com/org/repo). The repository must be publicly accessible — private repositories are not currently supported.Start Scan
Review Results
| Card | Description |
|---|---|
| Total Findings | Number of leaked secrets detected |
| Critical | High-entropy secrets (API keys, private keys) |
| High | Passwords, tokens, and other credentials |
| Scan Duration | Time taken to complete the scan |
- File path and line number where the secret was found
- Commit hash that introduced the secret
- Author and date of the commit
- Masked secret (partially redacted for safety)
- Rule ID identifying the type of secret
Credential Leak Monitor
The Credential Leak Monitor checks domains and company names against the Have I Been Pwned breach database. This helps assessors evaluate whether the assessed entity’s credentials or user data have appeared in known data breaches — relevant to PCI DSS Requirements 8.3 (password security) and 8.6 (account management).Features
Domain Breach Check
example.com) to check if it appears in any known data breaches. Results show all matching breaches with:| Field | Description |
|---|---|
| Breach Name | Name of the breached service |
| Breach Date | When the breach occurred |
| Accounts Affected | Number of compromised accounts |
| Data Classes | Types of data exposed (emails, passwords, phone numbers, etc.) |
| Verified | Whether the breach has been verified by HIBP |
Company Search
Breach Database Search
Recent Breaches
HIBP_API_KEY in the environment).Threat Briefing
The Threat Briefing aggregates real-time threat intelligence from four public sources into a single consolidated view. It provides assessors with an up-to-date picture of the current threat landscape — useful for contextualizing PCI DSS assessment findings and prioritizing remediation.Intelligence Sources
| Source | Data | API |
|---|---|---|
| NVD | Recent critical CVEs (CVSS 9.0+) | NVD API v2 |
| CISA KEV | Recently added known exploited vulnerabilities | NVD API with hasKev filter |
| FIRST EPSS | Top 10 most exploitable CVEs by probability | FIRST EPSS API |
| HIBP | Recent verified data breaches (last 90 days) | Have I Been Pwned API |
Generating a Briefing
Select Time Range
Generate
Review Summary
| Card | Description |
|---|---|
| Critical CVEs | Number of critical-severity CVEs published in the selected period |
| New KEVs | Newly added CISA Known Exploited Vulnerabilities |
| Recent Breaches | Verified data breaches from the last 90 days |
| Top EPSS | Highest exploit probability score among current top CVEs |
| Total Items | Total deduplicated threat items across all sources |
Review Threat Items
- Source icon (NVD, KEV, EPSS, or Breach)
- Severity badge (Critical, High, Medium, Info)
- Title with key metric (CVSS score, EPSS percentage, or account count)
- Date published or added
- Tags (CVE, KEV, Exploited, EPSS, Breach, data classes)
- Link to the original source (NVD detail page or HIBP)
Remediation Dashboard
The Remediation Dashboard provides a unified view of all findings from all security tools. It does not create new data — it aggregates and displays findings that already exist in the individual tool results.What It Shows
The dashboard is organized into five sections: Summary Cards| Card | Description |
|---|---|
| Total Findings | Count of all findings across all tools |
| Critical + High Open | Count of open findings with Critical or High severity (highlighted in red) |
| Remediation Rate | Percentage of findings that are Fixed or Accepted Risk. Color-coded: green (80%+), yellow (50–79%), red (below 50%) |
| Tools with Findings | Count of tools that have at least one finding (e.g., 5/5) |
Recommended Workflow
The security tools are designed to be used in a logical sequence during a PCI DSS assessment:Port & Service Scanner
SSL/TLS Checker
Headers & DNS
CVE Lookup
Patch Management
Log Audit Validator
Access Review
ASV Scan Import
Pen Test Parser
Payment Page Script Monitor
Firewall Rule Analyzer
Password Policy Analyzer
Anti-Malware Deployment Checker
FIM Report Parser
CISA KEV Tracker
Secret Scanner
Credential Leak Monitor
Threat Briefing
Auto-Fill Summary
Each tool can auto-fill its corresponding PCI DSS requirement with a structured justification:| Tool | Target Requirement | Justification Includes |
|---|---|---|
| Port & Service Scanner | 1.2.1 | Hosts, open ports, risky services, PCI issues, compliance status |
| SSL/TLS Checker | 4.2.1 | Domain, grade, protocol version, PCI issues, compliance status |
| CVE Lookup + EPSS | 6.3 | Product, version, CVE count, severity breakdown, CVSS scores, EPSS exploit probability |
| Patch Management | 6.3.3 | Vendor, total patches, missing critical/high, overdue count, compliance status |
| Log Audit Validator | 10.2.1 | Log format, total entries, field completeness (6 fields), confidence levels |
| Access Review | 7.2.1, 7.2.5, 8.6.1 | Source, total accounts, inactive/shared/admin/no-MFA counts, compliance status |
| ASV Scan Import | 11.3.2 | Vendor, scan date, host count, finding count, PASS/FAIL |
| Pen Test Parser | 11.4.2 / 11.4.3 / 11.4.5 | Tool, tester, date, test type, finding count, severity breakdown |
| Headers & DNS | 2.2.5 | Domain, grade, headers passed/total, DNS records, PCI status |
| Payment Page Script Monitor | 11.6.1 | URL, total scripts, third-party count, SRI coverage, CSP presence, compliance status |
| Firewall Rule Analyzer | 1.2.5, 1.3.1, 1.3.2 | Format, total rules, allow/deny counts, flagged violations, compliance status |
| Password Policy Analyzer | 8.3.6, 8.3.7, 8.3.9 | Source, min length, complexity, history, max age, lockout settings, checks passed/failed |
| Anti-Malware Deployment Checker | 5.2.1, 5.3.1, 5.3.2 | Vendor, total endpoints, agents down, signatures outdated, real-time disabled, compliance status |
| FIM Report Parser | 11.5.1, 11.5.2 | Tool, total changes, critical changes, unauthorized count, files monitored, compliance status |