How vul.ninja works

From connecting your cloud to fixing your first finding — the full flow.

01

Connect your cloud in 60 seconds

Deploy a read-only IAM role in AWS via CloudFormation, or authorize via OAuth for Azure and GCP. AWS connections use short-lived STS tokens with no stored credentials; OAuth tokens are encrypted at rest. Write access is opt-in and only used for remediation you explicitly approve.

Learn about AWS, Azure, and GCP integrations
FIRST SCAN · LIVE
production · 3 clouds
✓ AWS connected · us-east-1, us-west-2
✓ Azure connected · eastus
✓ GCP connected · us-central1
RESOURCES DISCOVERED
AWS
85
resources
Azure
20
resources
GCP
51
resources
Running security checks…
✓ IAM permissions
✓ Network exposure
✓ Encryption settings
Storage policies…
Findings so far
3 critical12 high18 med
scan results
47
findings across 156 resources
3
Critical
12
High
18
Medium
14
Low
First scan completed in 8 min 42 sec
02

Your first scan — results in minutes

Once connected, vul.ninja inventories every resource across your clouds and runs automated security checks covering IAM permissions, network exposure, encryption gaps, and misconfigured storage. Critical findings surface first, ranked by exploitability — not just severity score. Most environments see their first results within 5–15 minutes.

03

Match installed software against known exploits

Beyond cloud misconfigurations, vul.ninja catalogs OS-level packages on every compute instance that has an agent — AWS Systems Manager on EC2, Azure Monitor Change Tracking on VMs, and OS Config on GCP Compute. Every package is matched against the full CISA KEV catalog and NVD CVE database.

So when CVE-2024-X drops and it affects openssl 1.1.1k, you see exactly which instances need patching — not a list of CVEs detached from your infrastructure.

PACKAGE INVENTORY
i-0a3f9c2b1 · us-east-1
openssl
1.1.1f-1ubuntu2
CVE-2023-0286
KEVcritical
curl
7.68.0-1ubuntu2
CVE-2023-38545
high
sudo
1.8.31-1ubuntu1
CVE-2021-3156
KEVcritical
bash
5.0-6ubuntu1
No CVE
3 of 4 packages · 2 KEVMatched against 1,500+ KEV · NVD
04

Shadow SOC triages every finding

The Shadow SOC agent automatically reviews every finding as it comes in, marks false positives so your queue stays clean, and groups related issues by root cause. You see a curated, prioritised list — not 47 raw alerts demanding individual attention.

Shadow SOC is one of six AI agents — learn more about our AI agents

Four agents run in sequence with your approval gating every fix.

01
Shadow SOC
Complete
02
Investigation
Complete
03
Remediation
Awaiting
04
Monitoring
Pending
INVESTIGATION · REASONING
CRITICAL
FINDING
S3 bucket prod-data allows public read access
BLAST RADIUS
2.3 GB across 847 objects
Last modified 2 hours ago
No bucket policy — relies on ACL
ATTACK PATH
  1. 1External actor discovers bucket via cert transparency logs
  2. 2Lists all objects (s3:ListBucket allowed by ACL)
  3. 3Downloads sensitive files (s3:GetObject public)
PROPOSED FIX
Remove public ACL, add explicit Deny policy for * principal
Hand-off → Remediation Agentanalyzed in 3.2s
05

Investigation Agent traces the attack path

For every critical finding, the Investigation Agent goes beyond the surface alert. It checks blast radius, traces the step-by-step attack path an adversary could follow, and delivers a plain-language brief — so you understand the actual risk, not just the misconfiguration. No more Googling CVE IDs at 11pm.

06

Fix it — one-click or AI-assisted

Free-tier users get detailed step-by-step remediation guides for every finding. Paid plans add the Remediation Agent: it generates a before/after diff, waits for your explicit approval, then applies the change — with a 30-day rollback window so you can undo anything with a single click. Your infrastructure, your sign-off, every time.

s3_bucket_policy.json
1 {
2 "Version": "2012-10-17",
3 "Statement": [[
4 - "Effect": "Allow",
5 - "Principal": "*",
4 + "Effect": "Deny",
5 + "Principal": "*",
6 + "Action": "s3:*",
7 + "Resource": "arn:aws:s3:::prod-data/*",
8 + "Condition": {
9 + "Bool": { "aws:SecureTransport": "false" }
10 + }
11 + }, {
12 + "Effect": "Allow",
13 + "Principal": { "AWS": "arn:aws:iam::123:role/app" },
14 "Action": "s3:GetObject",
15 "Resource": "arn:aws:s3:::prod-data/*"
16 }
17 ]
18 }
+9 additions
-2 deletions

Set it and forget it

The six steps above run on their own — on a schedule you pick, triggered from CI/CD, or both.

Scheduled runs

From every 5 minutes to weekly. Pick a cadence per agent — Shadow SOC on every scan, Monitoring every hour, Compliance Evidence once a week.

Weekly digest

Monday-morning email summarising agent activity, new findings, what's still open, and exactly how much AI spend you incurred last week.

API tokens for CI/CD

Trigger any agent from your pipeline with a scoped API token. Fail a deploy on a critical KEV hit. Kick off a Strike Team on merge to main.

First MCP server for cloud security
Beta

And if your agent is the one shipping the infra…

Skip the dashboard entirely.

The pipeline above runs the same way for human operators and AI agents. The difference is the surface.

vul.ninja's MCP server exposes assess_iac_change, evaluate_iam_policy, and get_remediation as tools your coding agent calls inline — so a misconfiguration is caught before the apply, not after.

See the MCP server
agent · vul.ninja MCP
$ claude commit infra/iam/deploy-role.tf
 
→ vulninja.evaluate_iam_policy(role)
 
HIGH iam:* on Resource:* — wildcard privilege escalation
finding overprivileged_deploy_role
suggest scope to s3:PutObject on arn:aws:s3:::deploys/*
 
✗ Commit blocked. Apply scoped policy? (y/N)

What you get out of it

Continuous scanning

Not point-in-time audits. vul.ninja scans on schedule and alerts on drift — so you're never surprised by a new misconfiguration.

AI that explains in plain English

Every finding comes with context. No more Googling CVE IDs at 11pm — Shadow SOC and Investigation Agent tell you what matters and why.

Multi-cloud from one dashboard

AWS, Azure, and GCP in one view. One remediation workflow. SOC 2 and ISO 27001 evidence packs ready for your auditor.

Built to the same standard we ask of our customers

Read-only cloud access by default. AWS connections use short-lived STS tokens; Azure and GCP refresh tokens are encrypted at rest. Every agent action is recorded to an audit log you can export.

See our full security posture

Try it free — no sales call required

Sign up, connect your cloud, and see your first findings in minutes.

Start free

No credit card required