AI-powered vulnerability analysis agent that queries security findings and enriches results with CISA KEV, exploit intelligence, and remediation recommendations.
- CVE Analysis: Enter any CVE ID to get comprehensive vulnerability reports
- Wiz Integration: Simulated Wiz security platform findings with 250+ dummy CVEs
- CISA KEV Lookup: Check if vulnerabilities are in CISA's Known Exploited Vulnerabilities catalog
- Threat Intelligence: External exploit data, EPSS scores, and risk summaries
- Remediation Guidance: Actionable recommendations for each vulnerability
- Async UI: Non-blocking interface that remains responsive during searches
- Tenable API Placeholder: Ready for future Tenable.io integration
./run-demo.shThis script will:
- Start a local web server on port 8000
- Automatically open your browser to http://localhost:8000
- Display server status in the terminal
# Start Python HTTP server
python3 -m http.server 8000
# Open browser to http://localhost:8000No dependencies required! This is a static HTML/JS/CSS application that runs entirely in the browser.
Required:
- Python 3 (for HTTP server)
- Modern web browser (Chrome, Firefox, Safari, Edge)
Vulnerability Analyzer/
├── index.html # Main application UI
├── app.js # Application logic and event handlers
├── mockData.js # 250+ dummy CVE findings and external intel
├── styles.css # Application styling
├── run-demo.sh # Demo startup script
└── README.md # This file
The application includes 250+ pre-populated CVEs for testing:
Featured CVEs (clickable in sidebar):
- CVE-2021-44228 (Log4Shell)
- CVE-2024-3400 (PAN-OS)
- CVE-2023-4966 (Citrix Bleed)
- CVE-2023-23397 (Outlook)
- CVE-2023-44487 (HTTP/2)
- CVE-2024-21762 (FortiOS)
- CVE-2022-30190 (Follina)
- CVE-2020-1472 (Zerologon)
- CVE-2021-34527 (PrintNightmare)
- CVE-2022-22965 (Spring4Shell)
- CVE-2019-0708 (BlueKeep)
- CVE-2023-29300 (ColdFusion)
Plus 240+ additional generated CVEs with varied:
- Severity levels (Critical, High, Medium, Low)
- Cloud providers (AWS, Azure, GCP)
- Asset types (VMs, Containers, Kubernetes, etc.)
- Exposure levels (Internet, Internal)
- Exploit status and CISA KEV data
- Start the application: Run
./run-demo.sh - Enter a CVE ID: Type a CVE in the search box or click a sample CVE from the sidebar
- View analysis: The app will display:
- Wiz security findings (if found in your environment)
- External threat intelligence
- CISA KEV status
- Risk priority and remediation recommendations
When ready to integrate with Wiz:
- Add your Wiz API credentials
- Replace mock data lookups with actual Wiz API calls
- Update the
analyzeCVE()function inapp.js
A placeholder structure is already in place in mockData.js. To integrate:
- Set
TENABLE_INTEGRATION.enabled = true - Add your Tenable API credentials
- Implement the
queryTenableVulnerability()function - Add Tenable lookup alongside Wiz in
analyzeCVE()
Port 8000 already in use:
# Kill existing process
lsof -ti:8000 | xargs kill -9
# Then run the demo script again
./run-demo.shBrowser doesn't open automatically:
- Manually navigate to http://localhost:8000
- Check your browser's popup settings
UI freezes during search:
- The app uses async/await with requestAnimationFrame
- If issues persist, check browser console for errors
- Use the sidebar sample CVEs for quick testing
- Try different severity levels to see varied risk priorities
- Test CVEs with and without Wiz findings to see different flows
- Use the "New chat" button to clear conversation history
- Toggle the sidebar using the hamburger menu icon in the top bar
Internal use for POC and demonstration purposes.