v3.7.2 — Service-Bound CVE Correlation & NVD 2.0 API #8
Rami8612
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
What's new in v3.7.2
Service-Bound CVE Correlation
Each CVE returned by
cve_lookupnow includes a SERVICE BINDING line derived fromCPE data, naming the exact vendor/product the CVE applies to. A global rule
(EVIDENCE_RULES rule 9) enforces that every CVE in a report or analysis is attached
only to the matching detected service — never reassigned to an unrelated service on the
same host.
CVE Query Lock
A new global rule (EVIDENCE_RULES rule 10) prevents the LLM from drifting when building
cve_lookupqueries after service discovery. Queries must be derived strictly fromthe detected product name and version string present in tool output. Forbidden inputs:
host IP, semantic pivots to adjacent software (Apache ≠ Log4j), and famous CVEs
introduced from background knowledge without a confirmed product match. The rule is
reinforced at skill level in both
reconandanalysis.Expanded
cve_lookup— Full NVD 2.0 API supportThe tool now exposes the complete NVD 2.0 API parameter set:
keyword+exact_matchcpe_namevirtual_match_stringcvss_severitypub_start_date/pub_end_datelast_mod_start_date/last_mod_end_dateno_rejectedThe knowledge file (
rami-kali/knowledge/tools/cve_lookup.md) has been fully rewrittenwith a parameter table, 8 invocation examples, and the CVE Query Lock decision
sequence.
Files changed
rami-kali/mcp_server.py·backend/skills/composer.py·backend/skills/definitions/recon.json·backend/skills/definitions/analysis.json·backend/skills/definitions/reporting.json·rami-kali/knowledge/tools/cve_lookup.md·
README.md·rami-kali/README.mdThis discussion was created from the release v3.7.2 — Service-Bound CVE Correlation & NVD 2.0 API.
Beta Was this translation helpful? Give feedback.
All reactions