Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications
salt-scanner
A linux vulnerability scanner based on Vulners Audit API and Salt Open, with Slack notifications.
Test:
```[root@localhost ~]# python -V; pip freeze|grep salt; pip freeze|grep slackclientPython 2.7.5salt==2016.11.5slackclient==1.0.5[root@localhost ~]# sudo SLACKAPITOKEN="EXAMPLETOKEN" python salt-scanner.py
=========================================================== _ _ / | | | | / _|\ --. __ _| | |_ \
--. _ _ _ _ _ _ _ _ _ --. \/ _
| | | --. \/ __/ _
| '_ \| '_ \ / _ \ '|/_/ / (| | | |_ /_/ / (| (| | | | | | | | / |_/ _,||_| _/ __,|| ||| ||_||
Vulnerability scanner based on Vulners API and Salt Open
- No default OS is configured. Detecting OS...
- Detected Operating Systems:
- OS Name: centos, OS Version: 7
- Getting the Installed Packages...
- Started Scanning '10.10.10.55'...
- Total Packages: 354
- 7 Vulnerable Packages Found - Severity: Critical
Started Scanning '10.10.10.56'...
- Total Packages: 332
- 66 Vulnerable Packages Found - Severity: Critical
Finished scanning 2 host(s). 2 Hosts are vulnerable!
Writing Output to File: 20170609-115923_b0575ead-c5f1-4ef1-9439-7249afa9d9e6.txt```
Slack Alert:

TODO:
- Documentation
- More alerting modules
- Clean up the code and add some error handling
- Use Salt Grains for getting the OS info and installed packages
To restore the repository, download the bundle
0x4D31-salt-scanner_-_2017-06-18_21-37-07.bundle and run:
git clone 0x4D31-salt-scanner_-_2017-06-18_21-37-07.bundle -b master
Source:
https://github.com/0x4D31/salt-scannerUploader:
0x4D31Upload date: 2017-06-18