Skip to Content

Host Vulnerability Check

Host vulnerability security checks primarily involve checking vulnerabilities in software packages installed via package management tools on the host system. This includes most of the native tools, components, and the kernel in the system, all of which can be checked for security using this feature.

Detection Principle

This method involves reading the software package management database to retrieve the current system’s installed software information. This data is uploaded to the cloud and matched against a self-built vulnerability database for analysis. The resulting vulnerability information will be displayed on the frontend interface.

Detection Cycle

  • The Agent plugin initiates a scan immediately upon startup.
  • By default, it scans every 12 hours.
  • After clearing a risk, it will be rechecked within 12 hours. If the risk has been fixed, the alert will be automatically deleted.

Detection Items

CategoryDetection ItemDescriptionCorresponding Version
rpmRedhatSupports checking Linux software vulnerabilities, including vulnerabilities in Redhat-based systems.V3.0
rpmCentOSSupports checking Linux software vulnerabilities, including vulnerabilities in CentOS-based systems.V3.0
rpmRockySupports checking Linux software vulnerabilities, including vulnerabilities in Rocky-based systems.V3.0
debUbuntuSupports checking Linux software vulnerabilities, including vulnerabilities in Ubuntu-based systems.V3.0
debDebianSupports checking Linux software vulnerabilities, including vulnerabilities in Debian-based systems.V3.0

Corresponding version refers to the product version, which can be found in the upgrade records along with version-specific upgrade content.