Verified scanning
Every target is proven yours via a token at /.well-known/cyberscan-<token>.txt — intrusive scans require a fresh proof.
Paste a URL, prove you own it, and get a prioritized list of findings — CVE-enriched, KEV-flagged, with remediation — in minutes. Built on best-of-breed OSS scanners and an enterprise-grade workflow.
Orchestrating the open-source security toolchain
Discovery, scanning, enrichment, prioritization, compliance mapping and reporting — wired together so a finding lands with the context to act on it.
Every target is proven yours via a token at /.well-known/cyberscan-<token>.txt — intrusive scans require a fresh proof.
CVSS · EPSS · KEV · exposure · exploit availability — fused into one 0–100 score so the highest-risk issue is always at the top.
Findings auto-tagged against OWASP Top 10, PCI-DSS v4, NIST 800-53 r5 and CIS Controls v8 — filterable in the UI, exported in every report.
Postgres row-level security keyed to app.tenant_id; four roles (owner, admin, analyst, viewer) enforced per endpoint.
Federate with Google, Entra ID, Apple or Keycloak. Auto-provision users, map roles from claims, mint API tokens for CI.
SHA-256 fingerprints across asset, template, CVEs and location — every scan tells you what's new, what's fixed and what's still open.
Cookies, bearer tokens, basic auth and custom headers — Fernet-encrypted at rest, decrypted on-the-fly, never logged.
Email, Slack and Microsoft Teams — each channel filtered by minimum severity, so the right people hear about the right issues.
Tenant-scoped record of every administrative action with user, IP, target and context — ready for SOC 2 and ISO 27001 evidence.
Cybershake doesn't reinvent the scanners — it composes them into a pipeline, normalizes their output, and turns raw signals into prioritized findings.
Top-1000 port discovery with configurable rate limiting. Feeds the rest of the pipeline a clean list of live services.
Probes every discovered endpoint, identifies tech stack, status and titles — the map the vuln stage uses.
Recursive crawler — links, JS bundles, sitemaps, robots — critical for SPA discovery and surface mapping.
Template-driven vulnerability scanning, sharded across four workers. CVEs, exposures, default logins, panels, JS leaks.
Deep TLS inspection — weak protocols, Heartbleed, ROBOT, weak DH, missing HSTS — with hard rules per PCI-DSS.
Security-header baseline (CSP, X-Frame, Referrer-Policy). Intrusive mode unlocks SQLi, XSS, SSRF and LFI checks.
If an external tool isn't on the worker, Cybershake falls back to hard-coded header and cookie-flag checks — you never get a silent gap in coverage.
Paste a URL into the dashboard. Cybershake mints a verification token bound to the asset and your tenant.
POST /api/v1/assets
{
"url": "https://api.acme.example"
}
Drop the token at the well-known path. Verification is checked before any scan starts and re-checked for intrusive runs.
PUT /.well-known/cyberscan-9f2e….txt
ok
Pipeline runs naabu → httpx → katana → nuclei → sslyze → ZAP, then enriches with NVD, EPSS and KEV before scoring.
POST /api/v1/scans
{ "asset_id": "a-9f2e", "profile": "standard" }
Severity isn't the same as risk. Cybershake fuses CVSS, exploit probability (EPSS), CISA KEV membership, exposure and exploit availability into a single composite score so triage isn't a guessing game.
KEV findings are floored to High — known exploitation in the wild always gets attention.
Each finding's CWE is resolved against four lookup tables, so the same vulnerability shows up tagged for the framework your team is being measured on.
Web-app risk classes — broken access control, cryptographic failures, injection, insecure design.
Cardholder data protection — TLS, secure development, input validation, vulnerability management.
Federal control families — system & communications protection, identification & authentication.
Prioritized defensive controls — secure configuration, account management, application software security.
CWE-79 Cross-site scriptingNext.js for the UI, FastAPI for the API, Celery on Redis for orchestration, Postgres with row-level security for tenancy, MinIO for raw artifacts. Helm charts ship per-pool worker deployments — scale recon, vuln, TLS and passive workloads independently.
Single-command local stack with a benign Juice Shop target, or a production Helm install with KEDA autoscaling and Prometheus metrics.
The fastest way to try Cybershake — full stack plus a built-in OWASP Juice Shop test target.
# clone, then
make up
make seed
make e2e
open http://localhost:3000
Per-pool worker deployments, KEDA autoscaling, Prometheus ServiceMonitor, optional cert-manager.
helm repo add cybershake https://albal.github.io/cyber helm install cs cybershake/cyberscan \ -n cyberscan --create-namespace
Bootstrap a full Kubernetes deployment on your laptop — the same chart that runs in production.
cd deploy/kind ./bootstrap.sh kubectl get pods -n cyberscan
Yes — MIT licensed, end to end. No paywalled scanner integrations, no telemetry, no upgrade gates between the OSS edition and what you'd self-host in production.
Yes, but only on assets verified within the last 7 days. Intrusive checks (SQLi, XSS, SSRF, LFI, brute-force) require explicit re-verification so you can't accidentally hit a target you don't own.
A scheduled feed worker pulls NVD, EPSS and CISA KEV every 6 hours. Findings reference the snapshot they were enriched against, so you can replay why a score moved.
Yes — OIDC works with Google, Microsoft Entra ID, Apple, Keycloak and anything that speaks the standard. Roles can be derived from IdP claims.
Cybershake is honest about its limits. Authorization bypasses, multi-step auth, race conditions and stored XSS that requires privileged context are out of scope — you still need humans for those. The scanner-coverage doc spells it out.
CSV, JSON and PDF exports include the full compliance tag set. Webhook-style integrations are on the roadmap; today most teams pipe the JSON export.
Spin up Cybershake locally in a single command and have a triaged scan of your first asset before your coffee gets cold.