Skip to main content

Detection Sources

We check whether a CVE can be detected by major open-source security tools.

OSV.dev (Open Source Vulnerabilities)

  • What it is: Google's aggregated vulnerability database for open-source packages
  • Coverage: npm, PyPI, Maven, Go, Rust, and other package ecosystems
  • Why it matters: If a CVE is in OSV, tools like Trivy, Grype, and OSV-Scanner can find it in your dependencies
  • Link: osv.dev

Nuclei Templates

  • What it is: Community-driven vulnerability scanner with 8,000+ detection templates
  • Coverage: Web application vulnerabilities, misconfigurations, exposed panels
  • Why it matters: Nuclei is widely used for security assessments and bug bounty hunting
  • Link: github.com/projectdiscovery/nuclei-templates

Sigma Rules

  • What it is: Generic signature format for SIEM systems
  • Coverage: Log-based detection for Windows, Linux, cloud, and application events
  • Why it matters: Sigma rules can be converted to Splunk, Elastic, Microsoft Sentinel, and other SIEM platforms
  • Link: github.com/SigmaHQ/sigma

Snort/Suricata Rules

  • What it is: Network intrusion detection system (IDS) rules
  • Coverage: Network traffic analysis, exploit detection, malicious payloads
  • Why it matters: Deployed at network perimeters to detect attacks in transit
  • Sources: Emerging Threats Open, c3rb3ru5d3d53c/signatures

YARA Rules

  • What it is: Pattern matching rules for identifying malware and files
  • Coverage: File-based detection, memory scanning, malware classification
  • Why it matters: Used by antivirus tools, EDR solutions, and incident responders
  • Link: github.com/Yara-Rules/rules

Semgrep Rules

  • What it is: Static analysis tool for finding bugs and security issues in code
  • Coverage: Source code patterns, vulnerable dependencies, insecure configurations
  • Why it matters: Catches vulnerabilities during development before deployment
  • Link: semgrep.dev/explore