CyfroAI Engine

CyfroAI Insights

CyfroAI Insights are generated automatically after a scan interval completes. You do not need to click anything to trigger analysis. As long as scans are running and vulnerabilities/misconfigurations/secrets are found, CyfroAI Insights will appear.

Our CyfroAI Engine receives the raw scan findings (open ports, detected CVEs, misconfigurations, exposed secrets) alongside network topology context (which hosts are reachable from where) and produces:

  1. 1An Executive Summary: An easily understandable overview of the most important security findings from that scan run.
  2. 2A Prioritized Risk List: Vulnerabilities re-ranked using exposure correlation, not just CVSS severity alone.

Executive Summary

An easily understandable summary of who is affected and what matters the most at a glance. A gradient card (Brain icon header) containing AI-generated paragraphs that describe:

  1. 1The overall security posture from this scan.
  2. 2The most significant findings in plain language.
  3. 3Any patterns or correlations across multiple findings.

CVE IDs mentioned in the summary are automatically linked to the corresponding entry in the Report page. Click any CVE ID to jump directly to its full detail.

Prioritized Risks

A ranked list of the most important vulnerabilities from this scan, sorted by AI-assessed effective risk rather than raw CVSS score alone. Each risk card can be expanded for full detail.

Collapsed card view:

ElementDescription
RankAI-assigned priority order (1 = highest risk)
Base SeverityOriginal scanner severity: Critical / High / Medium / Low
Effective RiskAI-adjusted severity after factoring in exposure and reachability
CVE / Finding IDThe vulnerability identifier (monospace)
Reachable badgeAnimated badge shown when the finding is confirmed reachable from outside your local network
Exposure statusExposed (red), Local Only (amber), or Unconfirmed (blue)
TitleShort description of the vulnerability
Open in ReportsDeep link to the Report page pre-filtered to this specific finding

Expanded card view:

SectionDescription
TargetThe host or IP address affected
PackageThe software package or service version where the vulnerability was found
CVSS ScoreNumeric score from the vulnerability database
Reachability ConfidenceA 0–100% bar showing how confident the AI is that this finding is network-reachable
Reasoning & ContextAI explanation of why this finding was prioritized, including infrastructure context
Recommended ActionThe single most important remediation step in easily understandable language
OS Remediation CommandsReady to run shell commands for patching, broken out by OS (Linux, macOS, Windows) where available
Correlation EvidenceTechnical notes on how exposure was assessed (network path data, open port correlation, etc.)

Use Expand All / Collapse All at the top of the section to open or close all cards at once.

Source Types

AI Insights can be generated from three types of scans:

Source TypeDescription
Network DiscoveryInsights derived from network scanning results. Focus on exposed services, open ports, and CVEs mapped to detected service versions.
Asset DiscoveryInsights from host and device discovery scans. Focus on unrecognized devices, MAC vendor anomalies, and unexpected hosts on the network.
System Vulnerability FindingsInsights from service fingerprinting and vulnerability assessment. Focus on package versions, host level CVEs, misconfigurations, TLS issues, and detected secrets.