Exploits Search

Search for vulnerabilities with known exploits across the VDB, filtered by ecosystem, severity, source, EPSS, and CISA KEV status.

The Exploits Search skill discovers exploited vulnerabilities across the entire Vulnetix VDB, with filtering by ecosystem, severity, exploit source, EPSS score, and CISA KEV status. Use it to find exploited vulnerabilities relevant to your repository’s technology stack.

This skill does not modify application code – it only updates .vulnetix/memory.yaml to track findings.

How this differs from /vulnetix:exploits: The Exploit Analysis skill performs deep analysis of a single known vulnerability (PoC fetching, ATT&CK mapping, CWSS scoring). This skill discovers exploited vulnerabilities across the landscape, optionally filtered to your repository’s ecosystems.

Invocation

/vulnetix:exploits-search [flags]

For example:

/vulnetix:exploits-search --ecosystem npm --severity CRITICAL
/vulnetix:exploits-search --in-kev --min-epss 0.5
/vulnetix:exploits-search -q "remote code execution"
/vulnetix:exploits-search --source metasploit --ecosystem maven

CLI Flags

FlagTypeDefaultDescription
--ecosystemstringauto-detectedPackage ecosystem (npm, pypi, maven, go, cargo, nuget, rubygems, packagist)
--sourceenumExploit source: exploitdb, metasploit, nuclei, vulncheck-xdb, crowdsec, github, poc
--severityenumCVSS severity: CRITICAL, HIGH, MEDIUM, LOW
--in-kevboolfalseOnly show exploits listed in the CISA KEV catalog
--min-epssfloatMinimum EPSS score threshold (0.0–1.0)
-qstringFree-text search query (CVE ID, title, description)
--sortenumrecentSort order: recent, epss, severity, maturity
--limitint100Maximum results per page (1–100)
--offsetint0Pagination offset

Auto-Ecosystem Detection

If the user does not specify an ecosystem, the skill auto-detects the repository’s ecosystem from manifest files and applies it as a default filter. If the repo uses multiple ecosystems, the skill asks whether to filter or search across all of them.

Natural Language Mapping

The skill maps natural language to CLI flags:

User saysFlags applied
“npm exploits”--ecosystem npm
“critical vulnerabilities”--severity CRITICAL
“metasploit modules”--source metasploit
“actively exploited” or “in KEV”--in-kev
“high EPSS” or “likely exploited”--min-epss 0.7 --sort epss
“sort by maturity”--sort maturity
“first 20”--limit 20
“next page”--offset <previous + limit>

Output

Results are presented in a table:

#CVE IDSeverityEPSSMaturityExploit SourcesKEVFix?
1CVE-2021-44228critical0.97WIDESPREADExDB:3 MSF:2 Nuc:5YesYes
2CVE-2024-XXXXXcritical0.82ACTIVEMSF:1 GH:3YesYes
3CVE-2023-YYYYYcritical0.65WEAPONIZEDExDB:1 Nuc:2NoNo

Column Definitions

  • EPSS – Exploit Prediction Scoring System probability (0.00–1.00)
  • Maturity – exploitation maturity level (see below)
  • Exploit Sources – abbreviated counts: ExDB (ExploitDB), MSF (Metasploit), Nuc (Nuclei), GH (GitHub PoCs), VCX (VulnCheck XDB), CS (CrowdSec)
  • KEV – in CISA Known Exploited Vulnerabilities catalog. If overdue, appends “(overdue)”
  • Fix? – whether a registry or source fix is available

Exploitation Maturity Levels

LevelScore RangeMeaning
NONE0–14No known exploitation activity
POC15–34Proof-of-concept exists
WEAPONIZED35–54Exploit integrated into frameworks or tools
ACTIVE55–74Active exploitation observed
WIDESPREAD75+Widespread exploitation across many targets

CrowdSec Sightings

If any result has active CrowdSec sightings (live exploitation detected from real network traffic), it is flagged prominently:

3 results have active CrowdSec sightings (live exploitation detected)

Ransomware Associations

If any CISA KEV result has ransomwareUse: true, it is always surfaced:

2 results are associated with known ransomware campaigns

Pagination

Showing 1-20 of 142. Say "next page" or "page 3" for more.

Memory Updates

After completing the search, the skill updates .vulnetix/memory.yaml:

  • For each result that matches a dependency in the repository (cross-referenced against manifest files), a stub entry is created with status: under_investigation and discovery.source: scan
  • Existing entries are not modified
  • If no results match repo dependencies, memory updates are skipped

Actionable Recommendations

For each result, the skill suggests next steps:

  • /vulnetix:exploits <vuln-id> – deep exploit analysis with PoCs, ATT&CK mapping, and CWSS scoring
  • /vulnetix:fix <vuln-id> – fix intelligence for results with available fixes
  • /vulnetix:remediation <vuln-id> – context-aware remediation plan
  • /vulnetix:vuln <vuln-id> – full vulnerability details

Example

/vulnetix:exploits-search --ecosystem npm --severity CRITICAL --sort epss

The skill detects npm from package.json, searches for critical npm exploits sorted by EPSS score, presents a table of results with maturity levels and exploit source counts, flags any with active CrowdSec sightings or ransomware associations, and creates memory entries for results matching installed dependencies.